Portable Computing Devices
When using a portable computing device (e.g., laptop, Palm Pilot, BlackBerry, USB devices, etc.) to access agency data, you must take precautions to ensure that mobile computing does not compromise the security of the systems being used or data therein.
To ensure the security of the device, implement one or both of the following standards:
-
A password-protected sign-on screen requirement for mobile equipment
-
A mechanism to encrypt business sensitive or confidential data (PII or PHI). Use whole disk encryption such as PGP where appropriate (e.g. laptops, tablets, desktops)
|
|