Setting Employee Responsibility

advertisement
Tool 3: Managing and Controlling Risk
Safeguarding Customer Information
Setting Employee Responsibility
Policy Statement
[Your Institution] has implemented basic security policies and controls that govern end
user computing operations, and management has the authority to evaluate the risks
associated with end user computing. The purpose of this policy is to establish general
guidelines for maintaining an end user computing environment within the bank that is
controlled, consistent, and secure and that will enhance the productivity of end users. The
board intends that the institution adhere to the guidelines set forth in the Joint Interagency
Policy Statement on End User Computing Risks issued January 25, 1988. The board of
directors adopts the following policies, standards, and controls as the bank’s end user
computing policy.
End User Computing Policy And Procedure Responsibility
The board of directors delegates the day-to-day management of the use of
microcomputers to the functional managers. They are responsible for ensuring that their
employees adhere to the bank’s policies and procedures.
End User Computing Committee
The board appoints the following staff members to the end user computing committee.
The purpose of this group is to assist bank management in developing and implementing
policies and procedures for the end user computing environment and for reviewing these
policies and procedures for feasibility, enforceability, and usability.
Information Systems Department
The information systems department is responsible for supporting and coordinating the
day-to-day operation of the end user computing environment in a manner that is
consistent and in compliance with the approved policies and procedures. Additionally,
the information systems department should monitor and review the activities of end users
AMERICAN BANKERS ASSOCIATION
to ensure that they are adhering to the institution’s microcomputing policies and
procedures.
Internal Audit Department
The internal audit department is responsible for conducting periodic reviews of the end
user computing environment to ensure that policies and procedures are adequate to
properly control the environment and that all end users consistently follow these policies
and procedures.
The internal audit department also has the responsibility to evaluate the level of
compliance with the institution’s end user computing standards, policies, and procedures
and to report any discrepancies to the appropriate department manager for correction and
enforcement and to the board of directors through the audit committee in their regularly
scheduled reports.
The internal audit department will be available to management, users, and the end user
computing committee to provide input and recommendations in certain circumstances,
including, but not limited to, the following:







Purchase of new software
Automation of procedures
Access control issues
Termination of employees
Development and testing of systems/procedures
Suspicion of fraud or misuse of software and/or hardware
Implementation of new controls and/or testing
Acquisition of Hardware and Software
The acquisition of all hardware, software, and peripherals must be properly justified and
must comply with the Institution’s capital expenditure policies.
 All acquisitions, installations, and implementations require review and
coordination by the information systems department and approval by the
appropriate department executive(s).
 Acquisitions of local area networks (LANs) or more complex systems may
require a feasibility study or evaluation prior to the approval of the acquisition.
The end user computing committee will determine any additional requirements
needed for the acquisition of more complex systems.
 The purchasing department will acquire all approved microcomputer (PC)
hardware and software.
AMERICAN BANKERS ASSOCIATION
2
 The information systems department will maintain a complete inventory of
hardware, software, and peripherals.
 All department systems will be equipped with standardized hardware and
software. The end user computing committee will be responsible for reviewing
and determining appropriate standardized hardware and software to be used by
bank personnel.
Licensed Use of Packaged Software
Employees are required to read and comply with commercial software license
agreements. Managers must be certain that employees understand that modifying, selling,
or duplicating commercial software packages is illegal and expressly against the Bank’s
policy. The bank may be held liable for anyone illegally obtaining or copying commercial
software. Civil damages for the unauthorized copying or use of software can be $50,000
or more, and criminal penalties can include fines and imprisonment. Duplicating software
includes but may not be limited to the following:
 Making a copy of a software program from the employee’s hard drive or from a
diskette.
 Using the master diskette on an employee’s home computer when the software is
already installed on one of the bank’s computers.
 Installing software that currently resides on an employee’s home computer on a
bank computer.
 Receiving an upgrade for a software package and installing the version on a
different computer.
 The information systems department must review and audit any public domain
software (e.g., Internet software) prior to installation on any bank-owned
microcomputer.
Physical Protection and Security of Hardware/Software
Managers in each user area are responsible for proper and adequate physical security and
protection of the hardware and software assigned to their departments. Department
managers are responsible for developing and implementing appropriate physical security
controls and protection of hardware and software and for ensuring compliance with
established physical security policies. In addition, department managers are responsible
for the following:
 Ensuring sensitive reports and information are properly safeguarded and disposed
of in a proper manner.
 Assessing their department’s physical control needs and implementing controls
necessary to ensure proper security and protection.
 Monitoring and maintaining control over the use of laptop microcomputers.
AMERICAN BANKERS ASSOCIATION
3
 Maintaining inventories of hardware and software and periodically auditing these
inventories.
 Securing the work areas housing microcomputers.
 Assessing the need for locks and keys.
 Establishing proper housekeeping rules.
 Maintaining adequate environmental controls.
 Training users on proper use and care of microcomputers.
 Although ultimate responsibility for the physical protection and security of
hardware and software rests with the department manager, each user is
responsible for the physical security and protection of his or her own
microcomputer. In addition, end users are responsible for the following:
o Abiding by all housekeeping policies established by management;
o Keeping a maintenance list identifying all maintenance done to their
equipment;
o Securing any laptop microcomputer while in their possession;
o Being aware of and reporting any suspicious individuals or activity to
management and
o Ensuring that all software is backed up and maintained in a secure area.
Restricted Access to Data and Software
It is the policy of the Institution to protect the processing, storage, and use of data on
microcomputers, LANs or wide area network (WAN) systems based on the level of the
data’s sensitivity and value to the bank. Each department manager will establish and
implement proper and adequate access controls to restrict access to data and software.
This is to prevent unauthorized access that could result in confidential data being
accessed, improper loading of software posing the risk of viruses and use of unauthorized
software, and improper downloading of programs and files that could result in
unauthorized copying.
Misuse of corporate data will be reported to management and the board of directors
through appropriate channels.
Each department is responsible for identifying and establishing the proper procedures to
ensure that hardware, software, and documentation is adequately backed up to ensure
timely recovery in the event of a disaster. The department manager will perform a risk
assessment of each department to determine the impact that loss of data would have on
the institution due to the following reasons:





Incorrect management decision
Improper disclosure of information
Fraud
Financial loss
Competitive disadvantage
AMERICAN BANKERS ASSOCIATION
4
Based on the results of the risk assessment, each department manager will be responsible
for ensuring that appropriate microcomputer backup procedures are included in each
department’s respective section of the disaster recovery plan for [Your Institution].
Data Integrity
Each department manager is responsible for implementing security measures and controls
to ensure that all data are adequately evaluated, tested, and validated prior to transfer or
release. This includes, but is not limited to, data that:
 Reside on microcomputers, LANs, and WANs and are downloaded or uploaded to
the mainframe or to another system.
 Reside on a microcomputer from which critical business decisions are made
and/or financial reporting for the bank is based.
Each department is responsible for developing and maintaining a list of all sensitive data
and of programs used to process the data. The manager or supervisor of the department is
responsible for updating the information and communicating the information to
employees.
Virus detection software will be installed on each microcomputer in the bank to help
ensure that no viruses are introduced into the bank’s systems.
Program Development, Documentation, and Testing
All developed software, applications, and programs must be fully tested and adequately
documented before becoming part of a system that processes the institution’s data.
Prior to the development of any new software application or program, the end user
computing committee will review the request for the new application or program and
perform a cost/benefit analysis.
Managers are responsible for overseeing new projects and ensuring management control
of the development process. Management control will encompass all phases including the
initial development phase, development of appropriate data editing controls, proper
input/output controls, report design, adequate testing, and documentation.
Training And Support
The board of directors understands that the increase in microcomputer use requires that
employees are properly trained and informed on the policies and procedures endorsed by
the institution with regard to end user computing. The ability of employees to enter, move
around, and leave the institution with ease increases the risk to the bank. Therefore,
management and the board plan to address these issues through policies, education, and
training of users on security and use of microcomputers.
AMERICAN BANKERS ASSOCIATION
5
The institution will provide end user computer training to all employees. All users will be
trained before they use institution-owned hardware and software. The training department
of the institution is responsible for developing end user training materials and providing
information and classes for all employees. Training will cover the bank’s policies and
procedures relating to end-user computing. The programs developed will increase
employees’ awareness about microcomputer security risks and vulnerabilities and the
appropriate preventive controls. The training department will maintain documentation
concerning training of all employees for review by department managers, internal audit,
the board of directors, and regulators.
The board of directors approved and adopted this policy on (date).
AMERICAN BANKERS ASSOCIATION
6
Download