Information Security Policy Flashcards

(5 cards)

1
Q

TPS-IT

1.10 Any unauthorized release of personal or confidential information collected on behalf of the TPS for police business shall be reported _____, _____, _____, or _____ (only where the unauthorized release involved personal information) following the discovery of the breach, in accordance with TPS Procedures, Section 17-02 – Information Breaches.

A
  1. immediately to a supervisor
  2. Unit Commander
  3. the ISO
  4. the Access & Privacy Coordinator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TPS-IT

2.1 Authorized Users are responsible for safeguarding and protecting _____, both electronic and hardcopy. System access is assigned based on the job role or function performed to ensure sensitive information is available to only authorized users. Password sharing, or providing access to another person, either deliberately or through failure to secure access, is _____. Hardcopies material must be shredded or discarded inside TPS secure confidential blue bins, when _____.

A
  1. police information
  2. prohibited
  3. no longer required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TPS-IT

2.6 Authorized Users’ offsite work location is to be considered _____. All requirements set out in this policy also apply to members authorized to work remotely.

A
  1. an extension of the primary TPS work location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPS-IT

2.7 Authorized Users should use _____ when conducting police business. Use of any electronic devices on the TPS network is subject to the rules set out in this policy. The TPS may, when necessary to an ongoing lawful investigation, ask to examine relevant information in a personal device and make copies of relevant information. Individuals who deny the TPS access may_____.

A
  1. TPS issued equipment
  2. face consequences for failing to cooperate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TPS-IT

TPS-IT resources and the information generated by, and contained within them, fall under the ownership of _____. Therefore, while the TPS is aware of, and respects the privacy interests of those who use its IT resources, it is stressed that authorized users will be subject to _____ when making use of TPS-IT resources.

A
  1. the Toronto Police Service
  2. a significantly diminished expectation of personal privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly