1.1 Overview
This policy is designed to set how Dalton, Walton & Carlton, Inc. (DW&C) strives to protect its employees, visitors and assets (buildings, property, information) against physical threats including but not limited to crimes (criminal damage and theft) and terrorism through the use of physical security controls.
Physical security necessitates applicable layers of not only physical but also technical measures to ensure a complete equilibrium between not only prevention and detection, but response measures as well. This policy is to be put in to use immediately, and is to be evaluated on a semi-annual basis to ensure it is adequate for DW&C’s needs and goals.
1.2 Policy Statement
This policy applies …show more content…
This policy applies to all users of DW&C’s owned or leased buildings, property and assets (Windel, D, 2008).
Internal system resources include: network devices: routers, switchers, firewalls, load balancers, other network devices; servers: both the physical and virtual servers, operating systems and their applications; any other system resources and subsidiary assets considered in scope (Windel)
External system resources include those assets that are owned and operated as well as maintained by any individual or company other than DW&C, unless these resources may affect the confidentiality, integrity, and availability of DW&C’s system resources and subsidiary assets. …show more content…
The climate control settings are to be located in the server room with restricted access to the controls (CDN).
1.6.3 Security of Equipment Off-Site
When computers/media devices are taken off site, the equipment must not be left in vehicles. The equipment must be locked when not in use. Privacy screens must be placed on the laptop screens to deter information from being seen by onlookers. Connection to the network will only be allowed through the virtual private network (VPN) connection installed on the computer / media device. If the computer/media device is damaged, lost or stolen, it must be reported to the employee’s manager and the IT department right away. Any losses or damages are to be recorded in the inventory system of DW&C.
1.6.4 Secure Disposal of Equipment
Any equipment that is to be disposed of or reused must have all data and software on it removed prior to disposing of. Only the IT department is approved to do these actions. The IT department will only use software removal tools approved by