Information Security Policy Flashcards

1
Q

This policy defines acceptable use of TPS Information & technology resources to ensure the _________________, ________________ and ___________ of information

a) control, consistency, availability

b) amount, access, quality

c) confidentiality, integrity, availability

d) none of the above

A

c) confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The guiding principles are to prevent misuse or loss of any information asset and to maintain member accountability for the protection of information assets

True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This policy applies to all members of the TPS regardless of their position or role

True or False

A

False, this policy applies to all authorized users having access to any TPS-IT recourses and all information contained within those resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorized users include with of the following

a) permanent or temporary members

b) contractors or consultants

c) volunteers

d) personnel affiliated with 3rd parties

e) all of the above

A

e) all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Workplace Technology Devices (WTD) is any computing end used device, typically with its own operating system, which can communicate to a network.

True or False

A

True

Examples include: standard workstations, mobile devices, photocopiers/scanners, laptops, monitors, MWS’s, printers, phones w voice mail, handheld ticketing devices, externa media storage drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information & Technology Resources is any system, service, hardware, and network resources that are owned by, or supplied to authorized users by the TPS.

True or False

A

True

This includes but is not limited to:

networks and network devices, communication & business applications, software, workplace technology devices, internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidential Information is all police information and is to be used for official business use only. It includes which of the following

a) privileged information

b) 3rd party information

c) personal information

d) any other information collected, obtained or derived for or from TPC records that must be kept confidential

e) all of the above

A

e) all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Records may become accessible through criminal or civil court processes, by subpoena or as requested under the MFIPPA

True of False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorized users must ___________________ and adhere to ___________________

a) comply with government laws, terms of usage

b) follow guidelines, rules of regulations

c) follow rules, policies and procedures

d) none of the above

A

a) comply with government laws, terms of usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is in charge of approving the acquisition of all new technology

a) The police services board

b) the chief of police

c) Unit Commander of IT

d) Chief Information Officer

A

d) Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorized users are responsible for __________________ and ________________ police information, both electronic and hardcopy

a) securing , retaining

b) safeguarding, protecting

c) monitoring and keeping

d) none of the above

A

b) safeguarding, protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Users are responsible for all activity while logged onto any IT resource. Which of the following are ways to prevent misusage

a) secure devices with a password protected screen saver

b) lock device if walking away from it

c) log off when not using device

d) all of the above

A

d) all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Working off site, the requirements of this policy do not apply

True or False

A

False

authorized users offsite work location is to be considered an extension of the primary TPS work location. All requirements set out in this policy also applies to members authorized to work remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Members have a significantly diminished expectation of personal privacy when making use of TPS-IT resources

True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a violation of this policy is suspected, TPS may restrict, suspend or revoke access to any TPS-IT system or resource

True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Violation of this policy may be considered ___________________

a) a criminal act

b) a training issue

c) discreditable conduct

d) all of the above

A

c) discreditable conduct