Access Control to Information Systems Manual/Section: Administrative/Information Services Policy No. 160 Key Words: security, access, remote access, special access, remote control 1. PURPOSE: 2. POLICY: 1.1 Define procedures for managing local and remote access to Children’s Hospital of Eastern Ontario (CHEO) Information Systems. 1.2 Define procedures for managing the software and hardware used by CHEO. 1.3 Protect CHEO’s Information systems’ confidentiality, integrity and availability. 1.4 Uphold CHEO’s obligations under the Personal Health Information Protection Act (PHIPA) and other statutes not to disclose or make use of information/data except for purposes specified in those acts and as described and applied in CHEO’s Confidentiality Agreement (Form No 6021). 2.1 Any individual who does not comply with this policy shall be subject to appropriate action, up to and including termination. 2.2 System Access: Information Technology (IT) equipment belonging to CHEO shall only be operated by authorized individuals. All individuals with access to these systems must ensure that they do not operate IT equipment or access information without possessing the proper authorization for that equipment or information. 2.2.1 Access to CHEO’s Information Systems will not be granted until the individual signs the Information System Access Control form (Form No 4056) that outlines the conditions of access CHEO’s Information Systems. Individual’s Director must submit to CHEO’s IS Helpdesk the Information Systems Access Control form that contains the list of IT resources individuals need to perform their job duties. 2.2.2 Administrative Access-level users must ensure that they are sufficiently trained and aware of the various operating systems and software configurations in their designated area of the CHEO IS environment. 2.2.3 Individuals must request Remote Access privilege from their Director and receive authorization before attempting to access any CHEO’s IT resources from a remote location. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 1 2.2.4 End users are not to attempt to gain access to any system, data or programs for which they do not have explicit authorization or consent from their Director through a signed Access to Information Systems Control Form. 2.2.5 User IDs, passwords, and authentication devices should not be shared, given, or used by any person other than the person to whom they were issued. If the practice of sharing is determined as required, the Department Director assumes responsibility and accountability for the security and privacy of information. 2.3 Software: CHEO may specify or prohibit software which will be processed on Hospital IT equipment used to access IT resources. 2.3.1 Without prior written authorization from CHEO, users may not: a) Copy software for use on their home/ personal computers. b) Provide copies of software to any independent contractor or clients of CHEO or to any third party. c) Install software on any of CHEO’s IT equipment. d) Download any software from the Internet or other online source to any of CHEO’s IT equipment. e) Modify, decompile, transform, reverse-engineer, or adapt any software. 2.3.2 All requests for new software for use on CHEO IT equipment must go through approval process (Appendix A) and be requested through IS Helpdesk to be placed on any CHEO IT equipment. 2.3.3 In the event when an urgent ad-hoc software download is required to fulfill job related duties, prior authorization from reporting Director is required. Both the user and reporting Director are responsible for ensuring license compliance and that downloaded software is taken from a safe and workrelated site. Follow-up communication to IS Helpdesk is required. 2.3.4 Using manual or automated methods, CHEO IS may periodically audit IT equipment that has been used to access CHEO IT Resources to determine if appropriate software is being used. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 2 2.4 Hardware: Only IT equipment that is approved and configured appropriately by IS Department can be connected to CHEO’s trusted network. If non-standard IT equipment needs to be used, IS Department will assess device features to determine the compatibility with other CHEO’s IT equipment. If deemed compatible and secure IS Department will provide limited "best effort" assistance in connecting the device to the public portion of the network and installing Citrix client. 2.4.1 Disposal of all returned, surplus or damaged equipment shall be carried out with the participation of the IS Department. 2.5 Malicious Code Management: All Users are responsible for preventing virus infection of CHEO’s IT equipment. IT equipment being used to access CHEO’s IT resources is required to have a virus detection software installed and will be enabled with current virus definitions. Any removable storage device used to transfer information from one machine to another must be scanned for viruses prior to accessing the information stored on the device. All items downloaded from the Internet or received from an untrusted source must be scanned for viruses prior to execution. 2.5.1 CHEO has the ability to, and will randomly scan all systems, communications equipment and computers to ensure adherence of this and other related policies. 2.6 Data Transmission: Sensitive information should not be transmitted over unprotected communication lines or Public medium such as the Internet. 2.6.1 Encryption should be used for the transmission of sensitive information if sent over unprotected communication lines or Public medium such as the Internet. 2.6.2 Network access control devices such as firewalls will be implemented to prevent access to sensitive information by unauthorized individuals. 2.6.3 Users of CHEO’s Remote Access services will not use or configure those services to act as servers for other users or the general public, unless specifically authorized by IS Department. 2.6.4 In the event a private computer system is being used to process corporate information/data, it is the user’s responsibility to ensure proper data encryption, confidentiality and safe storage of information is adhered to. 2.7 Approved by: Executive Team Revision Number: 1 Data Protection: CHEO IS Department will backup data residing in designated locations on scheduled basis. All information/data backed up will be stored in an approved Date: April 20, 2010 3 manner, depending on level of sensitivity. 2.7.1 2.8 Users saving sensitive information outside of CHEO’s IS Systems are responsible for preventing unauthorized access to it. This includes but not limited to: a) Encrypt data on Universal Serial Bus (USB) sticks. b) Encrypt or password protect sensitive files on optical and magnetic removable media. c) Encrypt or password protect information stored on portable IT equipment. d) Periodically check portable IT equipment for malicious code and report infections to IS Helpdesk Physical Security: Media control and destruction shall only be carried out under the authorization of CHEO IS. All CHEO IT devices must be physically protected to the value of the equipment and /or the highest sensitivity level of the information/data processed. 2.8.1 Users utilizing portable IT equipment and removable media (USB memory, optical and magnetic media) must take reasonable precaution to ensure physical security of these devices. Users should never leave these devices unattended and must notify Hospital IS Helpdesk and CHEO Security immediately if the device is missing. 3. SCOPE: 4. DEFINITIONS: 2.9 Auditing and Monitoring: As an owner of IT resources with vested interest in its performance and security, CHEO IS Department is obliged to audit and monitor those resources to ensure that they are secure from damage (for example, through computer viruses or excessive, unauthorized use of computer memory resources) and are used only for authorized purposes. 3.1 All CHEO IT equipment, systems and services owned, leased, or in the custody of CHEO 3.2 All CHEO Users inclusive of the Research Institute 3.3 All CHEO information systems records Administrative access: is higher level of access control to a system or application that allows such user to perform configuration changes and to establish access privileges for other users of the system. This level of access is typically restricted to IS personnel or approved vendors and contractors. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 4 BSA: is Business Systems Analyst from IS Department at CHEO who is responsible for applications. CHEO IS: Information Services Department at CHEO. CHEO IS Helpdesk: is team within IS Department that provides front-line support to CHEO users. CHEOnet: is CHEO’s intranet (internal website). CHEO public network: is portion of CHEO wired or wireless network that is allowed for use by patients and visitors (similar to airport hot spot). CHEO trusted network: is portion of CHEO wired or wireless network that is reserved for use by CHEO staff using trusted devices approved and maintained by Hospital IS Department. Citrix: is a remote access and application delivery solution that allows Users to connect to applications available from central servers. Designated locations: are network file shares (example: J:\ Drive) Encryption: is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Firewall: is a dedicated appliance or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules. Individual: is any person who does not meet the criteria of “User”. IT equipment: is any computing hardware used to access, process and store or transmit CHEO information (ex. Personal Computer (PC) or server). Portable IT equipment includes laptop, tablet PC, handhelds and smartphones. IT resource: is any tool or application that is used in CHEO and is maintained by CHEO IS Department (ex. shared network drive, ADT application or printer). Remote Access: is the ability to access a CHEO computer, network drive, or application from a remote location. Remote access is applicable to many forms of connectivity methodologies including but not limited to dial-up, VPN, and Citrix. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 5 Remote Control: is remote monitoring/assistance software employed to assist users with problems by being able to access their desktop remotely. Sensitive Data: any information that CHEO has obtained and is responsible for according to the applicable provincial and federal legislation. This term also includes any CHEO internal information that may harm its public image. This may include but not limited to Patient, Corporate and HR information. User: is an individual who has authorized access to the Hospital information systems and has signed the “Confidentiality Agreement”(Form No. 6021) VPN (virtual private network): is a connectivity method that creates a secure tunnel connection between remote user/location and company IT resources over a public network infrastructure such as Internet. Data passing between the two ends of the tunnel is encrypted. 5. RESPONSIBILITY: 5.1 Directors are responsible: to ensure that they grant access to appropriate CHEO IT resources only to those individuals who require this access in order to perform their job duties. For signing and submitting an “Information Systems Access Control” form. Informing IS Department when access to an IT resource is no longer needed due to the employment status change or other reason. When in doubt consult with IS Department to determine the appropriate access level for a User to adequately perform their job duties. This document is to be forwarded to CHEO’s IS Helpdesk who will initiate the account provisioning process to estimate and absorb any licensing and additional IS related costs of granting access (ex. network and voice connections). If in doubt Directors should consult with IS Department to determine these costs. to approve and ensure license compliance for any urgent ad hoc software downloads. 5.2 IS Department is responsible: for the optimal configuration, availability, data protection and security of CHEO IT resources. for software license control and asset management will be carried out by IS Department Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 6 for ensuring compliance for compiling a list of Users with access to CHEO’s IT resources. 5.3 All Users are responsible: for ensuring conditions set out in this policy are adhered to and report any violations to their supervisor or IS Department to store all sensitive data in designated locations for complying with the terms of the applicable software license agreements 5.4 6. PROCEDURE: Human Resources (HR) and Office of Medical Staff are responsible: for storing the signed “Confidentiality Agreement” form on each individual’s file for providing individuals with copies of the Acceptable Use of Information Systems and Privacy and Confidentiality of Personal Health Information policies upon hiring. New user accounts creation and change of access 6.1 Any individual wanting to access CHEO’s IT resources on CHEO’s grounds must have CHEO’s identification as described in Employee Identification Policy and agree with provisions of this policy and “Acceptable Use of Information Systems Policy” by signing “Confidentiality Agreement” form If individual will only access CHEO’s IT resources remotely (vendor support, consultants, affiliated providers, etc.), initiating Director must validate the identity of the individual and securely communicate the user ID and password. At IS Management discretion “Confidentiality Agreement” form can be replaced with appropriate Non-Disclosure Agreement or Data Sharing Agreement. 6.2 CHEO’s IS Helpdesk will create the network account, email box and forward access request to the appropriate BSAs if access to clinical or enterprise systems is required. BSAs will provision the applications accounts and arrange for appropriate training. CHEO’s IS Department will retain all signed copies of “Information Systems Access Control” form. 6.3 CHEO’s IS Helpdesk will confirm that the individual’s work location is equipped with appropriate data and voice connections, and if required, will arrange for the work to be completed. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 7 6.4 On the first day of work, the user must report to CHEO’s IS Helpdesk to obtain their account information and to reset their network password. The user will receive brief instruction on how to logon to CHEO’s network. The temporary password is set to expire at the time of the first login. At that time, the user will be required to enter a new password as per Acceptable Use of Information Systems Policy. 6.5 If changes to the existing user’s access are required, an “Information Systems Access Control” form will be completed by the Director and forwarded to CHEO’s IS Helpdesk to initiate the change process. If access to clinical or enterprise systems is required, CHEO’s IS Helpdesk will forward access change request to the BSA responsible for the application. The BSA will make changes to the existing account reflecting the changes in access level and arrange for appropriate training. Terminations of employment with CHEO 6.6 The Director will notify CHEO’s IS Helpdesk when a user has been terminated. CHEO’s IS Helpdesk will forward an access revocation request to the BSAs to disable the applications accounts as of the effective date or has left employment with the hospital. CHEO’s IS Helpdesk will set the network account to expire at the last day of employment and disable any remote access privileges. User’s account information, emails and files will be retained for a minimum of three (3) months after which time all this data will be purged. Any time within this three (3) month period reporting Director may request CHEO’s IS Helpdesk to forward new incoming email, move old email and old files to another user. 6.7 In case of immediate dismissal CHEO Senior Management will notify IS Management immediately to disable all access privileges for affected user(s). Remote Access 6.8 Remote access is authorized by the user’s Director through the “Information Systems Access Control” form forwarded to CHEO IS Helpdesk who will notify the user and arrange for the installation of the remote access client and appropriate training. General Access 6.9 Approved by: Executive Team Revision Number: 1 To have their application or network password reset, users must report to IS Helpdesk in person and provide CHEO’s Date: April 20, 2010 8 identification (Employee Identification Policy). For password resets outside of normal IS Helpdesk hours users must report to switchboard or CHEO Security for their identity validation. Once their identity is confirmed, IS Helpdesk on-call will reset user’s password remotely. 6.10 For general use and management of systems, regular user accounts should be used. System accounts should only be used for performing the tasks they were issued to conduct. 6.11 When CHEO IS Staff access a User’s PC using the remote control tools, they will always ask the user for permission as a common courtesy. In the event that the User is not present, the IS staff will leave a note [e.g. via email] explaining the activity that took place in his/her absence. Exceptions to this protocol will occur in an emergency situation or on direction from CHEO Senior Management. 6.12 Log files for remote control tools will be turned on when in use and monitored by CHEO IS Management. Patient Information 6.13 Patients/Patient Guardians who require access to personal health information that is stored in digital format may do so through an authorized clinical provider from CHEO in accordance with the Access to and Disclosure of Patient Health Information Policy. 7. CROSSREFERENCES: CHEO, Acceptable Use of Information Systems Policy CHEO, Access to and Disclosure of Patient Health Information Policy CHEO, Employee Identification Policy CHEO, Privacy And Confidentiality of Patient Personal Health Information Policy Information System access Control (Form No 4056) Confidentiality Agreement (Form No 6021) 8. REFERENCES: 9. ATTACHMENTS Appendix A: New Software Approval Process 10. DEVELOPED BY: Pavlo Ignatusha, Manager, Information Services Brian Vezina, Senior Business Systems Analyst, Information Services Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 9 Appendix A New Software Approval Process Software Request Requirements Analysis Requirement Confirmed? No Yes Change Advisory Board Approval? No No Is the Package Supported? Yes Yes Terms & Conditions Disclaimer Sent to User Do we need to Buy License? No Yes Request Dropped No Does the Requestor want to Proceed? Yes Standard Procurement Once Purchase Order Sent Schedule Installation Status Updates Infor Purchasing System Notes 1. Need Standard Terms & Conditions for use of Non-Supported Software 2. Establish List of Supported, NonSupported (rest is prohibited) 3. Establish Regular Review of Non-Supported Software to see if should indeed be Supported. Approved by: Executive Team Revision Number: 1 Date: April 20, 2010 10