www.informationshield.com Information Security Policies Information Exchange Policy Policy # Version 1.0 Effective Date Contact MM/DD/YYYY Policy Contact Email Phone contact@companyx.com 888.123.4567 Table of Contents Purpose ..................................................................................................................................... 1 Scope ........................................................................................................................................ 1 Policy ......................................................................................................................................... 1 Violations ..................................................................................................................................11 Definitions .................................................................................................................................11 References ...............................................................................................................................11 Related Documents ..................................................................................................................11 Approval and Ownership ...........................................................................................................11 Revision History ........................................................................................................................12 PURPOSE This policy defines the requirements for the exchange of information with parties external to Company X. SCOPE The target audience of this policy is any Company X employee and partner who access any Company X information in hardcopy or on any Company X information asset. POLICY Disclosure Restrictions External Information Requests - All requests from a third party for internal information that is not classified as PUBLIC must be approved by both the Information Owner and the Company X corporate counsel, who must each be given five business days to evaluate the merits of the request. Requests For Organization Information - Unless authorized by top management, all requests for information about Company X and its business activities including, but not limited to, questionnaires, surveys, and newspaper interviews, must be referred to the Public Relations Department. Information Transfer To Third Parties - Company X software, documentation, and all other types of internal information must not be sold or otherwise transferred to any nonCompany X party for any purposes other than those expressly authorized by management. Computer-Related Access Numbers - Information regarding access to Company X computer and communication systems, such as dial-up modem phone numbers, is considered confidential and must not be posted on the Internet, listed in telephone Policy # CONFIDENTIAL Page 1 directories, placed on business cards, or otherwise made available to third parties without the advance written permission of the Information Security Manager. Disclosure Of Information System Controls - Workers must not disclose to any persons outside Company X either the information system controls that are in use or the way in which these controls are implemented without the permission of the Information Security Manager. Internet Information Exchange - Company X software, documentation, and all other types of internal information must not be sold or otherwise transferred to any non-Company X party for any purposes other than the business purposes expressly authorized by management. Financial Information Disclosure - Every disclosure of information about the financial condition of Company X, anticipated changes in financial position, and business developments that could reasonably be expected to materially alter the way investors view the company must be cleared in advance with the Public Relations Department or a vice president, and made publicly available to all investors and interested parties at the same time. Fair Disclosure Of Material Financial Information - Every unintentional disclosure of material financial information, to either a private group or a private individual outside of Company X, must be followed by a public announcement within a twenty-four hour period. Organization Representations - All business-related representations made by Company X workers including, but not limited to, those made in advertisements, in union negotiations, on product labels, and in government reports, must be truthful at all times. Sharing Marketing Information - Marketing information including, but not limited to, prices, sales policies, strategies, plans, market share status, and other marketing information must never be disclosed to competitors. Legal Action Information - Third-party requests for information related to a current legal case must not be granted unless the request is made by an authorized government agency or court of law. Future Earnings Or Products - Workers must not make any public representations about Company X future earnings or the prospects for new products. External Information Requests - All requests from a third party for internal information that is not of a sales, marketing, or public relations nature must be approved by both the Information Owner and the Company X corporate counsel, who must each be given five business days to evaluate the merits of the request. Controversial Sensitive Information - Controversial and sensitive Company X information must be released to the public in installments. Public Information Disclosures Public Representation Approval - All public representations including, but not limited to, media advertisements, Internet home pages, electronic bulletin board postings, and voice mail broadcast messages, must be issued or approved by the Public Relations Department. Release Of Organization Information - Permission to disclose any internal Company X information to the news media or to other third parties must be obtained from Company X senior management prior to release. Policy # CONFIDENTIAL Page 2 Information Released To The Public — Contact Name - Information generated by Company X and released to the public must be accompanied by the name of a designated staff member acting as the single recognized official source and point-of-contact. Information Released To The Public — Authorization - All internal Company X information to be released to the public must have first been reviewed by management according to an established and documented process. Information Disclosure Approval - Disclosure of any file stored on Company X systems, or any message sent through the Company X network, to outside parties must be preceded by the review and approval of the vice president of the Legal Department. Nature And Location Of Organization Information - Information about the nature and location of Company X information, such as that found in a data dictionary, is confidential and must only be disclosed to those with a demonstrable need to know. Agreements Software And Data Exchange Agreements - Exchanges of in-house software or internal information between Company X and any third party must be accompanied by a written agreement that specifies the terms of the exchange, and the manner in which the software or information is to be handled and protected. Third-Party Software Agreements - All software developed by Company X for use by prospects, customers, business partners, and others, must be distributed only after the recipients have signed an agreement stating they will not disassemble, reverse engineer, modify, or otherwise use the programs except as agreed with Company X. Online Contracts By Exchange Of Paper And Signatures - Whenever third parties accept an online offer made by Company X, they must provide paper-based, hand-rendered signatures by regular mail or courier. Identity Validation Of External Parties - Before workers release any internal Company X information, enter into any contracts, or order any products through public networks, the identity of the individuals and organizations contacted must be confirmed through digital certificates, letters of credit, third-party references, or telephone conversations. Transit Controls Delivering Sensitive Computer Output - Private, confidential, or secret computer system hardcopy output must be personally delivered to the designated recipients and never delivered to an unattended desk, or left out in the open in an unoccupied office. Using Couriers - Private, Confidential, or Secret information in hardcopy form that is sent through commercial courier must always be tracked with a weigh bill number and must always be marked recipient “signature required.” Delivery Of Secret Information - All deliveries of secret information must be conducted such that the recipient formally acknowledges that the information has been received. Secret Information Leaving Offices - Secret Company X information, no matter what form it happens to take, must not leave Company X offices unless the approval of the Information Security Manager has first been obtained. Sensitive Information Removal Log - All sensitive information removed from Company X premises must be logged with a record of the date, the information involved, and the persons possessing the information. Policy # CONFIDENTIAL Page 3 Downloading Sensitive Information - Before any Company X secret, confidential, or private information may be transferred from one computer to another, the worker making the transfer must ensure that access controls on the destination computer are commensurate with access controls on the originating computer. Sending Sensitive Information - If private, confidential, or secret information is sent through internal mail, external mail, or by courier, it must be enclosed in two envelopes or containers with the outside envelope or container providing no indication of the sensitivity of the information contained therein and the inside sealed and opaque envelope or container labeled “Private,” “Confidential,” or “Secret.” Trade Secrets Sending Secret Information - Secret information must be shipped or sent through internal or external mails in a sealed opaque envelope marked “To Be Opened By Addressee Only,” which is enclosed in a plain outer envelope that does not indicate the sensitivity of the contents. Transmitting Secret Hardcopy Information - Secret information in hardcopy form must be sent by trusted courier or registered mail. Wireless Transmissions Of Secret Information - Wireless technology must never be used for the transmission of unencrypted secret information. Software Distributed To Third Parties - All software developed by Company X for use by prospects, customers, business partners, and others must be distributed in object code form only. Third-Party Delivery Of Secret Information - Unencrypted secret information must not be sent through any third parties including, but not limited to, couriers, postal services, telephone companies, and Internet service providers. Traveling With Secret Information - Workers must not travel on public transportation when in the possession of secret Company X information unless specific management approval has been obtained. International Transport Of Secret Information — Security - Whenever secret information is carried by a Company X worker into a foreign country, the information must either be stored in some inaccessible form or must remain in the worker’s possession at all times. International Transport Of Secret Information — Authorization - Company X workers must not take secret Company X information into another country unless advance permission has been obtained from the Information Security Manager. Encryption Of Private Electronic Mail - Unencrypted information that has been labeled private must never be transmitted through electronic mail. International Travel - Special Travel Laptops Required - All Company X employees traveling with Secret information must only use special “travel” laptops issued by the Information Technology department. These special devices are stripped of all non-essential information and must employ both full-disk encryption and two-factor authentication. Public Network Data Transmission - Strong cryptography and security protocols such as SSL/TLS or IPSEC must be implemented to safeguard confidential Company X information, e.g., cardholder data, during transmission over open, public networks. Faxing Information Policy # CONFIDENTIAL Page 4 Faxing Sensitive Information — Notification - If secret information is to be sent by fax, the recipient must have been notified of the time when it will be transmitted, and also have agreed that an authorized person will be present at the destination machine when the material is sent. An exception to this policy is permitted when the destination fax machine is physically or logically restricted such that persons who are not authorized to see the material being faxed may not enter the immediate area or otherwise gain access to faxes received. Faxing Sensitive Information — Human Presence - Sensitive materials must not be faxed unless the sender has immediately beforehand confirmed that an authorized staff member is on hand to properly handle the materials at the receiving machine. When the transmission is complete, the staff member at the receiving end must confirm to the sender that a certain number of pages were received. An exception is allowed if the receiving machine is in a locked room accessible only to authorized personnel, or if a password-protected fax mailbox is used to restrict unauthorized release of faxed materials. Faxing Sensitive Information — Intermediaries - Sensitive Company X information must not be faxed through untrusted intermediaries including, but not limited to, hotel staff, airport office services staff, and rented mailbox store staff. Faxing Sensitive Information — Cover Sheet - When sensitive information must be faxed, a cover sheet must be sent and acknowledged by the recipient, after which the sensitive information may be sent through a second call. Faxing Sensitive Information — Unencrypted - Sensitive information may be faxed over unencrypted lines only when time is of the essence, no alternative and higher-security transmission methods are available, and voice contact with the receiving party is established immediately prior to transmission. Faxing Sensitive Information — Physical Security - Secret or confidential information must not be sent to an unattended fax machine unless the destination machine is in a locked room for which the keys are possessed only by people authorized to receive the information. Faxing Sensitive Information - Annual Inventory of FAX numbers - Company X must maintain an inventory of all outgoing FAX numbers and the associated organization designated to receive sensitive information. The list of numbers must be updated and verified annually. The list must be distributed to all personnel responsible for transmitting sensitive data. Faxing Secret Information — Encryption - Secret information must not be sent by fax unless the transmission is encrypted using methods approved by the Company X Information Security Department. Faxing Confidential Information — Speed Dial - When confidential information is sent by fax, the operator must not use preset destination telephone numbers, but must instead manually enter the destination number. Faxing Secret Information — Passwords - Secret information must not be sent by fax unless the receiving machine, prior to the initiation of a transmission, successfully receives a correct password from an authorized person at the receiving end of the transmission. Fax Cover Sheet Notice - All outgoing Company X faxes must include a cover sheet that includes wording approved by the Legal Department. Fax Logs - Logs reflecting the involved phone numbers and the number of pages for all inbound and outbound fax transmissions must be retained for one year. Policy # CONFIDENTIAL Page 5 Electronic Messaging Secret Information In Electronic Mail - Unencrypted secret information must not be sent by electronic mail unless a vice president specifically authorizes each occurrence. Electronic Mail Addresses - Workers must not employ any electronic mail addresses other than official Company X electronic mail addresses for all company business matters. Sender Contact Information - All electronic mail sent using Company X information systems must contain the sender’s first and last name, job title, organizational unit, and telephone number. Electronic Marketing Material Source - All marketing materials sent through electronic mail must include an accurate return address and must provide clear and explicit instructions permitting recipients to quickly be removed from the distribution list. Centralized Control Over Electronic Mail Systems - Centralized control over both inbound and outbound electronic mail will be provided by the Information Technology Department. All Company X electronic mail must flow through systems established, operated, and maintained by that same department. Outbound Electronic Mail Footers - A footer prepared by the Legal Department that indicates that the message may contain confidential information, is for the use of the named recipients only, has been logged for archival purposes, may be reviewed by parties at Company X other than those named in the message header, and does not necessarily constitute an official representation of Company X, must be automatically appended to all outbound electronic mail originating from Company X computers. Outbound Electronic Mail Footer Approval - All outbound electronic mail messages sent from Company X computers must have a standard footer automatically added to it. The words appearing in this footer must be approved by both the Information Security Manager and the Chief Legal Counsel. Sales Department Electronic Mail - Salespersons must not send electronic mail messages to customers or prospects unless these messages are first reviewed and approved by a supervisor. Electronic Mail Distributions - Company X must receive a positive confirmation through an opt-in process for anyone who is placed on an electronic mail distribution list. Blocking To Field On Systems Containing Private Information - In order to prevent the inappropriate disclosure of electronic mail addresses, the "to" field for all electronic mail messages containing more than one addressee, that are issued from systems containing private information, must be automatically blocked. Customer Communications Customer Status Notifications Sent Via Electronic Mail - Company X must not use electronic mail as the sole source of notification for changes or updates to customer account features. Any customer notifications sent via electronic mail will include instructions for validating the authenticity of the message. No Specific Information in Automated Electronic Replies - Automated electronic mail replies should not include specific information, such as names and contact information for Company-X personnel that could be used to gain access to sensitive data. Business Information Systems Policy # CONFIDENTIAL Page 6 Intermediate Products Containing Sensitive Information - If a copy machine jams or malfunctions when workers are making copies of secret information, they must not leave the machine until all copies of the information are removed from the machine or destroyed beyond recognition. Distribution Of Marketing Materials - Workers must not use facsimile machines, electronic mail, auto-dialer robot voice systems, or any other electronic communications systems for the distribution of unsolicited advertising material. Recording Video Conferences - Company X video conferencing sessions must not be recorded unless this recording is approved in advance by the manager of information security and communicated in advance to all video conference participants. Logically Separate Voice And Data On IP Networks - In every instance where voice over IP (VOIP) technology is deployed at Company X facilities, this technology must use a completely logically separate network other than the network used for data transmission. Critical Telephone Services Must Not Be Supported Via VOIP - Company X businesscritical telephone services -- such as over-the-phone order-taking with sales representatives -- must not be supported by voice over IP (VOIP) systems, until the Information Security Manager deems these systems sufficiently reliable and stable to support these services. End-User Application Programs - All small systems must use approved software license management software which is configured to detect unauthorized copies of third-party software as well as new or modified application programs developed by end users. Diskless Workstations - All workers in the Research and Development Department must use diskless workstations connected to an isolated departmental network when working on new product development projects and tasks. Time-Sensitive Information - The most confidential time-sensitive information must not be handled by electronic mail, voice mail, telephone calls, or other computerized systems until the specifics have been announced publicly. Direct Inward System Access Implementation - Company X sites must not enable the direct inward system access features on private branch exchange telephone systems unless they are accompanied by a fraud detection and limitation system approved by the manager of the Telecommunications Department. Record Change Orders - Orders to change any internal Company X records that are placed over the phone must not be honored unless the identity of the caller has been verified by approved procedures. Conference Bridge Activation - Conference bridges must be specifically activated only when needed. They must not be left in an activated state when not in use. Internet and Intranet Publicly-Modifiable Directories - All publicly-modifiable directories on Company X Internetconnected computers must be reviewed and cleared each evening. Intranet Postings - Before any information is posted to the Company X intranet, both the department manager in charge of the relevant intranet page and the Owner of the involved information must approve. Intranet Content Ownership - Unless approved in advance by the Information Technology Department Manager, and explicitly noted on the intranet web page, all content posted to the Company X intranet is the property of Company X. Policy # CONFIDENTIAL Page 7 Intranet Information Validation - Before posting material to the Company X intranet, workers must resolve all legal issues associated with the posting, confirm that the information and programs do not contain malicious code, and also confirm the information’s accuracy, timeliness, and relevance to Company X business. Intranet Content Review And Testing - All new or changed content to be posted to the Company X intranet must pass through a staging area where authorized personnel will review the content and test its operation, unless written approval of the Information Security Manager has been obtained. Internet Content Moved To Intranet - All content downloaded from the Internet must go through a structured and documented cleansing process before being posted to the Company X intranet. Intranet Data Review - The Information Security Department must review all postings to the Company X intranet quarterly to confirm that none of these postings contain confidential or secret information. Intranet Server Approval - All Company X intranet servers must be authorized by the network services manager in the Information Technology Department before they are connected to the internal network. Access To Production Systems By Intranet - The intranet must not be used to provide real-time connections to any Company X production information system that has extended user authentication access controls, unless the approval of the Information Security Manager has first been obtained. Transfer To Internet From Intranet - Company X intranet users must not be transferred directly to an Internet site without being presented with a notice indicating that the users are about to be transferred to the Internet and a requirement that they confirm their understanding of this network transfer. Outbound Internet Communications - All outbound Internet communications must reflect well on the Company X reputation and public image. Internet News Sources - News feeds, electronic mail mailing lists, push data updates, and other mechanisms for receiving information over the Internet must be restricted to material that is clearly related to Company X business and the duties of the receiving workers. Internet Representations Including Affiliation - When engaged in discussion groups, chat rooms, and other Internet offerings, only those individuals authorized by management to provide official support for Company X products and services may indicate their affiliation with Company X. Internet Disclosure Of Contact Information - Children and adults must not disclose their real names, addresses, or telephone numbers on electronic bulletin boards, chat rooms, or other public forums reached by the Internet. Internet Transmission Of Sensitive Information - Unencrypted Company X secret, proprietary, or private information must not be sent over the Internet. Transferring Downloaded Files - Computers that are not connected to the Company X network must be used when downloading any files from the Internet. These files must then be checked with an authorized virus detection package prior to being moved to any other computer. Web Site Security Policy # CONFIDENTIAL Page 8 Web Sites With Similar Names - Company X Legal Department staff must periodically employ web search engines to determine whether any web sites with similar names are masquerading as Company X authorized or sponsored sites. Unofficial Web Pages - Every sponsor and/or owner of an unofficial web page dealing with Company X products or services must have an in-force contract signed by the Public Relations Department Manager. Internet Web Page Review - A staff member from the Marketing Department must check the Company X web page daily to confirm that the page is up-and-running, that no unauthorized changes have been made, and that no unauthorized links have been established. Internet Server Command Response - Internet servers must be modified so the verbose response to certain commands does not reveal information about the server software installed. Secret Information On Web - Company X secret information must not be resident on either Internet or intranet servers. Internet Monitoring For Information Use - The Legal Department must monitor the Internet on at least a monthly basis for the unauthorized use of Company X trademarks, service marks, brand names, or copyrighted materials owned by Company X. Use Of Third-Party Trademarks - Company X web and commerce sites must not use any other organization’s trademarks or service marks anywhere unless the usage reflects the actual attributes of Company X products or services, and advance permission has been obtained from Company X corporate legal counsel. Encryption Concealing Information Transmission - Information that is sensitive, which may be used by adversaries, and that is readily available in readable form over public channels, must be slightly modified to conceal its true high-integrity nature. Secret Data Transmission - All Company X secret data transmitted over any communication network must be encrypted. Protecting Outbound Secret Computerized Information - All secret computerized information which is being sent to any external party must be encrypted using an encryption process approved by the Information Security Department. Transportation Of Secret Data - All secret data transported in computer-readable storage media must be encrypted. Secret Information Encryption - All computerized secret information must be encrypted, with tools approved by the Information Security Department, when not in active use for authorized business purposes. VOIP Remote Management Or Auditing Requires Encrypted Channel - Whenever either remote management or remote auditing is performed on a voice over IP (VOIP) network, these connections must employ a fully-encrypted channel. Customer Electronic Mail Encryption - Every electronic mail message containing private information about one or more specific customers must be encrypted when sent through a network. Policy # CONFIDENTIAL Page 9 Electronic Mail Encryption - All sensitive information including, but not limited to, credit card numbers, passwords, and research and development information must be encrypted when transmitted through electronic mail. Compression And Encryption Of Secret Data - If secret information is to be stored on a multi-user computer system, it must be compressed, then encrypted using an approved encryption algorithm. Encrypted Message Protection - All content sent over the Company X internal data network must be encrypted. This network must also employ diversionary messages to conceal the fact that certain parties are communicating with certain other parties. Messages must also be padded with extraneous information to conceal the length of the actual messages being sent. Anonymous FTP Server Information - All user-provided files that have not been explicitly approved for public release by the Marketing Department, and that are resident on the Company X anonymous FTP server, must be encrypted using Company X standard software. Public Information Publicly Posting Only Generic Information - With the exception of top management, all publicly-posted contact points must use generic job titles rather than individual names. For example, web sites, Internet public databases, and help wanted advertising would refer to "systems administrator" rather than "Mary Smith." Likewise, direct dial telephone numbers and individual email accounts must not be publicly posted. Permissible Ways To Obtain Competitive Information - Company X workers must obtain information about competitors from public domain sources, or legally purchase such information from its rightful owner (such as a market research firm). Competitor information gathered by any other means, whether intentionally or unintentionally obtained, must be reported immediately to the Company X chief legal officer. Third-Party Use Of Organization Name - No third-party organization may use the Company X name in its advertising or marketing materials unless the written permission of corporate legal counsel has first been obtained. Use Of Organization Name - Every public written use of the Company X name in published material requires the advance approval of a vice president or the Public Relations Department. Presentation Of Public Image - Company X must at all times present a low-profile and secure image to both the public and third parties. This means that information about the existence and nature of significant assets must be accessible only to those persons with a demonstrable need to know. Public Access Workstations - All user-supplied files and all temporary files created by workstation-resident software must be automatically deleted nightly. Public Research - Whenever Company X performs polls, analytical studies, or other research that is intended for public consumption, the authors of the research must clearly state in their report both the sponsor(s) and all potential conflicts of interest. Policy # CONFIDENTIAL Page 10 VIOLATIONS Any violation of this policy may result in disciplinary action, up to and including termination of employment. Company X reserves the right to notify the appropriate law enforcement authorities of any unlawful activity and to cooperate in any investigation of such activity. Company X does not consider conduct in violation of this policy to be within an employee’s or partner’s course and scope of employment, or the direct consequence of the discharge of the employee’s or partner’s duties. Accordingly, to the extent permitted by law, Company X reserves the right not to defend or pay any damages awarded against employees or partners that result from violation of this policy. Any employee or partner who is requested to undertake an activity which he or she believes is in violation of this policy, must provide a written or verbal complaint to his or her manager, any other manager or the Human Resources Department as soon as possible. DEFINITIONS Confidential Information (Sensitive Information) - Any Company X information that is not publicly known and includes tangible and intangible information in all forms, such as information that is observed or orally delivered, or is in electronic form, or is written or in other tangible form. Confidential Information may include, but is not limited to, source code, product designs and plans, beta and benchmarking results, patent applications, production methods, product roadmaps, customer lists and information, prospect lists and information, promotional plans, competitive information, names, salaries, skills, positions, pre-public financial results, product costs, and pricing, and employee information and lists including organizational charts. Confidential Information also includes any confidential information received by Company X from a third party under a non-disclosure agreement. Information Asset - Any Company X data in any form, and the equipment used to manage, process, or store Company X data, that is used in the course of executing business. This includes, but is not limited to, corporate, customer, and partner data. Partner - Any non-employee of Company X who is contractually bound to provide some form of service to Company X. REFERENCES ISO/IEC 27002 - 10.8 Exchange of Information RELATED DOCUMENTS APPROVAL AND OWNERSHIP Owner Title Date Policy Author Title MM/DD/YYYY Approved By Title Date Executive Sponsor Title MM/DD/YYYY Policy # CONFIDENTIAL Signature Signature Page 11 REVISION HISTORY Version Description Revision Date Review Date 1.0 Initial Version MM/DD/YYYY MM/DD/YYYY Policy # CONFIDENTIAL Reviewer/Approver Name Page 12