Cyber Security Policy Manual
application to gain access to confidential information
application to identify and mitigate vulnerabilities
2. Monitor attempts to exploit
vulnerabilities in external facing systems and applications
3. Block attempts to exploit
vulnerabilities in external facing systems and applications
Environmental factors may disrupt the availability of systems and applications to employees and residents
External Activate the Continuity of Operations plan
Theft of laptop or mobile device
Internal
1. Determine if laptop or mobile device contained confidential information 2. Wipe mobile device remotely 3. Contact law enforcement agency and file a report 4. Engage Cyber Liability Insurance agency if deemed necessary 1. Engage Cyber Liability Insurance agency if deemed necessary 2. Work with rollout/leasing area to ensure that proper disposal of assets is being followed 3. Provide training to employee on
Inappropriate disposal of assets or documents that contain confidential information
Internal
how to dispose of documents that contain confidential information
I NTERESTED P ARTIES Interested Party
Requirement
City Manager’s Office (CMO)
Protecting residents’ information, and meeting statutory, regulatory and contractual information security requirements Protecting personal identifiable information, financial information and personal health information
Employees
Cyber Security Policy Manual
43
Made with FlippingBook Annual report