Cyber Security Policy Manual

application to gain access to confidential information

application to identify and mitigate vulnerabilities

2. Monitor attempts to exploit

vulnerabilities in external facing systems and applications

3. Block attempts to exploit

vulnerabilities in external facing systems and applications

Environmental factors may disrupt the availability of systems and applications to employees and residents

External Activate the Continuity of Operations plan

Theft of laptop or mobile device

Internal

1. Determine if laptop or mobile device contained confidential information 2. Wipe mobile device remotely 3. Contact law enforcement agency and file a report 4. Engage Cyber Liability Insurance agency if deemed necessary 1. Engage Cyber Liability Insurance agency if deemed necessary 2. Work with rollout/leasing area to ensure that proper disposal of assets is being followed 3. Provide training to employee on

Inappropriate disposal of assets or documents that contain confidential information

Internal

how to dispose of documents that contain confidential information

I NTERESTED P ARTIES Interested Party

Requirement

City Manager’s Office (CMO)

Protecting residents’ information, and meeting statutory, regulatory and contractual information security requirements Protecting personal identifiable information, financial information and personal health information

Employees

Cyber Security Policy Manual

43

Made with FlippingBook Annual report