Information Security Policy Flashcards

1
Q

Purpose

This policy defines acceptable use of Toronto Police Service Information and Technology (TPS-IT)
resources to ensure the

A

confidentiality, integrity, and availability of information. The guiding principles are to prevent misuse or loss of any information asset and to maintain member accountability for the protection of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scope

This policy applies to all Authorized Users having

A

access to any TPS-IT resources and all
information contained within those resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

General

  1. TPS-IT resources are the sole property of the Toronto Police Service (TPS). The TPS grants
A

Authorized Users access to its TPS-IT resources to conduct official police business only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

General

  1. Any records created and/or maintained on any TPS-IT resource are property of the
A

Service and bound by Service Governance and the TPS Records Retention By-Law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

General

  1. Records may become accessible through criminal or civil court processes, by
A

subpoena or as requested under MFIPPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

General

  1. Authorized Users are responsible for complying
A

government law and Service Governance when using TPS-IT resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

General

  1. Authorized Users who are granted access must adhere to the terms of use agreements for external databases, owned and operated by
A

partnering external agencies. Such systems included but are not limited to, CPIC, MTO-ISS, OSOR, MCM, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General

  1. Authorized Users must seek approval from the
A

Chief Information Officer (CIO) prior to the acquisition of all new technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

General

  1. Authorized Users must first consult with the CIO’s Office prior to building any
A

unit specific databases or repositories of information such as SharePoint, Excel, or MS Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

General

  1. Authorized Users must consult with the Information Security Unit prior to the
A

implementation of any technology changes that involve the new collection, use or disclosure of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General

  1. Any misuse of a TPS-IT resource or violation of this agreement SHALL be reported immediately to a
A

supervisor, Unit Commander, or the Information Security Officer (ISO) following the discovery of the misuse or violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

General

  1. Any unauthorized release of personal or confidential information collected on behalf of the TPS for police business SHALL be reported immediately to a
A

supervisor, Unit Commander, the ISO, or the Access & Privacy Coordinator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security of Computerized Systems and Information

  1. Authorized Users are responsible for safeguarding and protecting police information, both electronic and hardcopy. System access is assigned based on the
A

job role or function performed to ensure sensitive information is available to only authorized users. Password sharing, or providing access to another person, either deliberately or through failure to secure access, is prohibited. Hardcopies material must be shredded or discarded inside TPS secure confidential blue bins, when no longer required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security of Computerized Systems and Information

  1. Authorized Users are responsible for all
A

activity while logged onto any TPS-IT resource. Devices must be secured with a password-protected screensaver and must be locked or logged off when left unattended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security of Computerized Systems and Information

  1. Authorized Users will ensure reasonable care is taken to protect
A

TPS-IT resources from theft, damage or illegal access; and against systems designed to disrupt, damage or place excessive load on the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security of Computerized Systems and Information

  1. Authorized Users who are issued a smartphone will ensure that
A

operating system or application-level updates are applied in a timely manner.

17
Q

Security of Computerized Systems and Information

  1. Portable storage devices containing sensitive information should be
A

encrypted.

18
Q

Security of Computerized Systems and Information

  1. Authorized Users’ offsite work location is to be considered an
A

extension of the primary TPS work location.

19
Q

Security of Computerized Systems and Information

  1. Authorized Users should use TPS issued equipment when
A

conducting police business. Use of any electronic devices on the TPS network is subject to the rules set out in this policy. The TPS may, when necessary to an ongoing lawful investigation, ask to examine relevant information in a personal device and make copies of relevant information. Individuals who deny the TPS access may face consequences for failing to cooperate.

20
Q

Policy Non-Compliance

A
  1. Attempt to exploit or circumvent the user-authentication or security functions of any computer, network or account.
  2. Provide account or password access to an unauthorized individual, including circumstances when a member has had their access deactivated, denied or terminated.
  3. Unauthorized copying, destruction, deletion, distortion, removal, concealment, modification or encryption of messages, files, or other police data.
  4. Use any program/script/command with the intent to interfere or tamper with any computer system, network or user’s session. Execute any form of network monitoring that will intercept data, scan ports, or attempt to circumvent the corporate firewall.
  5. Access, create, publish or communicate material that is unsolicited, abusive, harassing, intimidating, threatening, discriminatory or offensive, and could otherwise interfere with another individual’s rights under the Human Rights Code or the Occupational Health and Safety Act.
  6. Use any unauthorized internet-based web services, even when used in a non-obligatory ‘free trial basis’.
  7. Access internet sites featuring sexual content, drugs, peer-to-peer file sharing, hate, violence, weapons, gambling and other illegal or unethical subjects – unless it is authorized for lawful or assigned job duties.
  8. Use any TPS-IT resource for personal commercial or financial gain, or for political causes.
21
Q

Systems Auditing and Monitoring

  1. The TPS reserves the right to access system information, without prior notice, and use all information and data stored on and communicated through TPS-IT resources for lawful purposes – to
A

facilitate work in a member’s absence, to conduct routine technical administration, to routinely audit system use, to investigate suspicions of improper system use and other misconduct and to comply with legal obligations. Members who engage in personal use of TPS- IT resources are deemed to accept that the TPS has this right of access and may raise no expectation of privacy that prevents the TPS from accessing and using information and data for its legitimate purposes.

22
Q

Definitions

Authorized User:

A

are all individuals who have been granted access to the Toronto Police Service’s
IT resources. This includes, but is not limited to, permanent members, contractors, volunteers, Temporary members, Consultant, Personnel affiliated with third parties.

23
Q

Workplace Technology Device (WTD): is

A

is any computing end user device, typically with its own operating system, which can communicate to a network. This includes, but is not limited to, standard workstations, mobile devices, photocopiers/scanners, laptops/notebooks/tablets, monitors, fax machines, mobile workstations (MWS), external media storage devices (hard drives, USBs, etc.), printers, telephones and voice mail, handheld ticketing devices.

24
Q

Information supplied Technology (IT) Resource: is

A

any system, service, hardware, and network resources that are owned by, or to Authorized Users by the Toronto Police Service. This includes, but is not limited to, networks and network devices, communication and business applications, software, Workplace Technology Devices, internet access.

25
Confidential Information: is
all police information and is to be used for official business use only. This includes, but is not limited to, privileged information, third party information, personal information, any other information collected, obtained or derived for or from TPS records that must be kept confidential under the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA), Youth Criminal Justice Act (YCJA), or any other applicable legislation.
26
Personal Devices and Technology:
any telecommunication equipment and technology that is not issued or authorized by the Service.
27