Internet Usage and Security policy - Wheaton Franciscan Healthcare

Category: IS
POLICY & PROCEDURE
Subject:
Internet Usage and Security
Classification:
Management Approved
Policy Owner:
WFH Chief Information Officer
Approved by:
WFH President and CEO
POLICY:
It is the policy of Wheaton Franciscan Healthcare (WFH) that access to the
Internet is provided to only those associates who have a legitimate business need
for such access.
RATIONALE:
Information technology is a resource that aids the physicians and the associates
of WFH to fulfill our mission and vision. In honoring our values of respect and
stewardship, we must understand that policies and procedures are in place to
protect the technology available to WFH associates by enabling them to have
reliable, effective, and efficient means of communicating, developing documents,
and storing vital information. Without information technology, the ministry provided
by WFH for its associates, patients and residents could not be fulfilled.
Effective: May 1, 2009
Specifically, WFH has made every effort to establish secure access to the
Internet. However, the wide array of new resources, new services, and
interconnectivity available via the Internet introduce new opportunities and risks.
SCOPE:
This policy applies to Wheaton Franciscan Healthcare’s owned and managed
regions and joint ventures that utilize WFH’s information technology.
PROCEDURE:
Access to the Internet will be granted based on the receipt of both a written
request from the appropriate manager and a signed Request for Internet Web
Access form by WFH Information Services (IS). It is the manager’s responsibility
to monitor appropriate staff use of the Internet.
Contractors and on-site consultants who have a need for Internet connectivity
while they are located in WFH facilities are encouraged to use the WFH guest
network, if available. If a guest network is not available, or if internal network
access is also required, the contractor/consultant may be granted associateequivalent access upon receipt of a written request from the sponsoring WFH
manager and a signed Request for Internet Web Access form by WFH IS. The
access granted will not be any greater than base access granted to WFH staff. In
particular, no additional firewall ports will be opened, nor will access to Web site
categories normally blocked for WFH staff be allowed. As with associates, it is the
manager’s responsibility to monitor appropriate contractor/consultant use of
WFH’s Internet facilities. It is the contractor’s/consultant’s responsibility to adhere
to WFH policies governing Internet use.
If an associate does not have sufficient Internet access and needs greater access
for a specific project or to perform their job duties, he/she may request enhanced
access by contacting WFH Information Security and presenting a valid business
IS
Internet Usage and Security
Page 1 of 5
reason for the enhanced access privileges.
ASSOCIATE ACCOUNTABILITY:
Use of the Internet: The ability to “surf” the World Wide Web and engage in other
Internet activities is not a fringe benefit to which all associates are entitled.
Violations of this policy or inappropriate use of the Internet can lead to revocation
of system privileges and/or disciplinary action. Inappropriate use includes, but is
not limited to:
 Use for personal business or gain
 Sending or forwarding chain letters, jokes, images, videos or other media
unrelated to your employment
 Installing or accessing non-work related software
 Use of, or posting material to Internet-based storage systems, bulletin
boards, and blogs
 Providing information about associates and patients
 Use of interactive web media and social networking sites, including but
not limited to YouTube, Facebook, Twitter and MySpace
 Any use which violates WFH Mission, Vision, or Values
Monitoring and Auditing: All use of the Internet is subject to monitoring by the
Information Services department. By signing the Request for Internet Web Access
form, associates acknowledge and agree to such monitoring. Internet use is
audited on a regular basis, and evidence of excessive or inappropriate use may
be provided to managers, leadership, Human Resources, and/or Office of General
Counsel.
INFORMATION INTEGRITY:
Information Reliability: There is no quality control process on the Internet. All
information taken from the Internet should be considered suspect until confirmed
by separate information from another source. Before using free Internet-supplied
information for business decision-making purposes, associates must corroborate
the information by consulting other sources.
Automatic Software Updates: User-requested automatic updating of software or
information on WFH computers via any Internet technology is prohibited.
INFORMATION CONFIDENTIALITY:
Posting Materials: Associates must not post WFH material (internal memos,
policies, etc.) on any publicly accessible Internet computer unless the director of
public relations has first approved the posting of these materials. In more general
terms, WFH internal information must not be placed in any computer unless the
persons who have access to that computer have a legitimate need to know the
involved information. Further, use of Internet-based data storage systems (like
Amazon Web Services, Google Desktop, etc) to store WFH-owned and managed
data is specifically prohibited.
Security Parameters: Credit card numbers, telephone calling card numbers,
passwords, and other security parameters that can be used to gain access to
goods or services, must not be sent over the Internet in readable form. The SSL
or SET encryption processes are both acceptable Internet encryption standards
for the protection of security parameters - in general these can be identified by the
presence of a closed padlock at the bottom of the browser screen.
PUBLIC REPRESENTATIONS:
External Representations: Associates may indicate his/her affiliation with WFH
in mailing lists (listservs), chat sessions, and other offerings on the Internet. This
IS
Internet Usage and Security
Page 2 of 5
may be done by explicitly adding certain words, or it may be implied, for instance
via an electronic mail address. In either case, whenever associates provide an
affiliation, they must also clearly indicate that the opinions expressed are their
own, or not necessarily those of WFH. Likewise, if an affiliation with WFH is
provided, political advocacy statements and product/service endorsements cannot
be issued unless the director of public relations has approved them.
Appropriate Behavior: Whenever an affiliation with WFH is included with an
Internet message or posting, "flaming" or similar written attacks are strictly
prohibited in order to avoid libel, defamation of character, and other legal
problems. Likewise, associates must not make threats against another user or
organization over the Internet. All Internet messages intended to harass, annoy,
or alarm another person are similarly prohibited. Acquisition and/or use of
materials or information inconsistent with WFH’s business are prohibited.
Examples of such materials include pirated software, purloined passwords, stolen
credit card numbers, and inappropriate written or graphic material (for instance,
pornography).
Blocking Sites: WFH firewalls, proxies, and other access control devices
(collectively, ‘firewalls’) routinely prevent users from connecting with certain nonbusiness Web sites. The ability to connect with a specific Web site does not in
itself imply that users of WFH systems are permitted to visit that site. Associates
using WFH computers who discover they have connected with a Web site that
contains sexually explicit, racist, violent, or other potentially offensive material
must immediately disconnect from that site. If a user encounters an inappropriate
Web site that is not blocked, they should submit the web site address (URL) to
WFH IS. The Web site will be reviewed and blocked, if appropriate. Likewise, if a
user believes that there is a legitimate need to access a Web site that has been
blocked; a request to remove the block should be submitted by either submitting
the built in feedback/request form from the block page, or submitting a request
through WFH IS Customer Service and Support (Help Desk). The request should
state the Web site address (URL), the reasons that the site is needed, and why
the block should be removed.
INTELLECTUAL PROPERTY RIGHTS:
Copyrights: WFH adheres to software vendors' license agreements. When at
work, or when using WFH computing or networking resources, copying of
software in a manner that is not consistent with the vendor's license is forbidden,
and prior to making any copy you deem to be lawful, you should consult with IS
and the vendor’s license terms. Likewise, participation in pirate software bulletin
boards and similar activities represent a conflict of interest with WFH work, and
are therefore prohibited. Similarly, the reproduction, forwarding, or in any other
way republishing or redistributing words, graphics, images or other materials,
whether originally obtained in hard copy or via the Internet, must be done only
with the permission of the author/owner. Associates should assume that all text,
images and graphics found on the Internet are protected by copyright unless
specific notices from a credible source state otherwise. When information from the
Internet is integrated into internal reports or used for other purposes, all material
must include labels such as "copyright, all rights reserved" as well as specifics
about the source of the information (author names, URLs, dates, etc.).
ACCESS CONTROL:
Browser User Authentication: Users must not save passwords in his/her Web
browsers or electronic mail clients because this may allow anybody who has
physical access to their workstations access to both the Internet with their
identities, as well as read and send their electronic mail. Instead, these passwords
must be provided each time that a browser or electronic mail client is invoked.
IS
Internet Usage and Security
Page 3 of 5
Internet Service Providers: With the exception of telecommuters and mobile
computer users, associates must not employ Internet service provider (ISP)
accounts and dial-up lines to access the Internet with WFH computers. Instead, all
Internet activity must pass through WFH firewalls so that access controls and
related security mechanisms can be applied.
PRIVACY EXPECTATIONS:
Junk E-mail: When associates receive unwanted or unsolicited e-mail (also
known as spam), they must refrain from responding directly to the sender and
should simply delete the message from his/her inbox. To respond to the sender
would indicate that the user ID is monitored regularly, and this would then invite
further junk email. If the message contains objectionable material, forward the
message to WFH IS Customer Service and Support (Help Desk). Messages from
these senders will automatically be blocked and discarded by the e-mail system at
the point they “enter the door”.
“Spoofing” (Impersonation): The current state of Internet e-mail technology
makes it relatively easy to “spoof” an electronic message (i.e. masquerade as
another user). To facilitate communications and to properly identify the sending
party, all e-mail sent outside the company using the Internet e-mail system must
contain the sender’s:
 First and last name
 Job title
 Department or function
 Organization
 Organizational unit (e.g., Information Services, Covenant Health System,
Waterloo, IA)
 Office phone and fax phone numbers
 E-mail address
This can be accomplished in Microsoft Outlook by creating an electronic
“signature” block that is automatically attached to all messages you send. The
Corporate Identity Standards manual contains information on how to create such
signatures.
Internet E-mail is not Private: When using Internet e-mail to conduct business
with external entities, remember that Internet e-mail is essentially the electronic
equivalent of a post card. These communications are visible for open viewing
while in transit to its destination. Internet e-mail use has made it even more likely
that a simple typing mistake will send the message to the wrong place. Therefore:
 The use of hand-typed Internet e-mail addresses in the “To:” line is
strongly discouraged. It is strongly recommended that personal address
book or contact list entries be created for anybody that you communicate
with on a regular basis. When the entry is created, double-check the
spelling of the e-mail address.
 The first time you send e-mail using an address book entry, it is
recommended that you verify via phone or fax message that the intended
user actually received it.
 Our Microsoft Exchange e-mail system automatically attaches an
additional disclaimer to all messages sent via Internet e-mail. This
message will be the functional equivalent of the standard “confidentiality”
message that appears on our fax cover sheets.
Because Internet e-mail is normally sent in clear text, sending patient or other
confidential information to external recipients via e-mail is prohibited unless a
WFH IS approved encryption solution is being employed.
User Anonymity: Misrepresenting, obscuring, suppressing, or replacing a user's
IS
Internet Usage and Security
Page 4 of 5
identity on the Internet or any WFH electronic communications system is
forbidden. The user name, electronic mail address, organizational affiliation, and
related information included with messages or postings must reflect the actual
originator of the messages or postings. No use of re-mailers or other services to
render a person anonymous may be used. Use of services that have been
established with the expectation that users would be anonymous is permissible
(e.g. anonymous FTP log-ins, web browsing).
REPORTING SECURITY PROBLEMS:
Notification Process:
The WFH Vice President, Compliance and HIPAA Services must be notified
immediately if:
 Sensitive WFH information is lost, disclosed to unauthorized parties, or
suspected of being lost or disclosed to unauthorized parties;
 Any unauthorized use of WFH's information systems has taken place, or
is suspected of taking place; or
 Passwords or other system access control mechanisms are lost, stolen,
or disclosed, or are suspected of being lost, stolen, or disclosed.
The specifics of security problems should not be discussed widely, but should
instead be shared on a need-to-know basis.
False Security Reports: The Internet has been plagued with hoaxes alleging
various security problems. Many of these hoaxes take the form of chain letters
that request that the receiving party send the message to other people.
Associates in receipt of information about computer viruses and other problems
should forward it to WFH IS Customer Service and Support (Help Desk), where it
will be logged and forwarded for investigation. Associates must not personally
redistribute this type of information.
Testing Controls: Associates must not probe ("test the doors”) the security
mechanisms at either WFH or other Internet sites unless they have first obtained
written permission from the WFH CIO. If associates probe security mechanisms,
alarms will be triggered and resources will needlessly be spent tracking the
activity. Likewise, both the possession and the usage of tools for cracking
information security are prohibited without the advance permission of the WFH
CIO.
Replaces:
IS Regulation 009
Cross reference:
Use of Computers and Communications Systems policy
Information Systems Access policy
Corporate Identity Standards Manual
Review Period:
Two (2) years
Original Policy Date:
December 14, 1999
Dates Updated:
August 25, 2000; March 19, 2003; May 1, 2005; May 1, 2009
IS
Internet Usage and Security
Page 5 of 5