Information Security Policy Flashcards
This policy defines acceptable use of TPS Information & technology resources to ensure the _________________, ________________ and ___________ of information
a) control, consistency, availability
b) amount, access, quality
c) confidentiality, integrity, availability
d) none of the above
c) confidentiality, integrity, availability
The guiding principles are to prevent misuse or loss of any information asset and to maintain member accountability for the protection of information assets
True or False
True
This policy applies to all members of the TPS regardless of their position or role
True or False
False, this policy applies to all authorized users having access to any TPS-IT recourses and all information contained within those resources
Authorized users include with of the following
a) permanent or temporary members
b) contractors or consultants
c) volunteers
d) personnel affiliated with 3rd parties
e) all of the above
e) all of the above
Workplace Technology Devices (WTD) is any computing end used device, typically with its own operating system, which can communicate to a network.
True or False
True
Examples include: standard workstations, mobile devices, photocopiers/scanners, laptops, monitors, MWS’s, printers, phones w voice mail, handheld ticketing devices, externa media storage drives
Information & Technology Resources is any system, service, hardware, and network resources that are owned by, or supplied to authorized users by the TPS.
True or False
True
This includes but is not limited to:
networks and network devices, communication & business applications, software, workplace technology devices, internet access
Confidential Information is all police information and is to be used for official business use only. It includes which of the following
a) privileged information
b) 3rd party information
c) personal information
d) any other information collected, obtained or derived for or from TPC records that must be kept confidential
e) all of the above
e) all of the above
Records may become accessible through criminal or civil court processes, by subpoena or as requested under the MFIPPA
True of False
True
Authorized users must ___________________ and adhere to ___________________
a) comply with government laws, terms of usage
b) follow guidelines, rules of regulations
c) follow rules, policies and procedures
d) none of the above
a) comply with government laws, terms of usage
Who is in charge of approving the acquisition of all new technology
a) The police services board
b) the chief of police
c) Unit Commander of IT
d) Chief Information Officer
d) Chief Information Officer
Authorized users are responsible for __________________ and ________________ police information, both electronic and hardcopy
a) securing , retaining
b) safeguarding, protecting
c) monitoring and keeping
d) none of the above
b) safeguarding, protecting
Users are responsible for all activity while logged onto any IT resource. Which of the following are ways to prevent misusage
a) secure devices with a password protected screen saver
b) lock device if walking away from it
c) log off when not using device
d) all of the above
d) all of the above
Working off site, the requirements of this policy do not apply
True or False
False
authorized users offsite work location is to be considered an extension of the primary TPS work location. All requirements set out in this policy also applies to members authorized to work remotely.
Members have a significantly diminished expectation of personal privacy when making use of TPS-IT resources
True or False
True
When a violation of this policy is suspected, TPS may restrict, suspend or revoke access to any TPS-IT system or resource
True or False
True