
Identify Risks
-
An annual assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of Confidential Personal Information.
-
Create an inventory of all computers, laptops, mobile devices, flash drives, disks, home computers, digital copiers, and other equipment used by the organization.
-
Locate and identify sensitive data and identify on which device(s) the data is stored. Also record which employee has access to the data.
-
Identify client information transmitted via email, cloud services, firm websites, custodians and other third party vendors.
Protect
-
Establish authentication procedures for employee access to email on all devices (computer and mobile devices).
-
Passwords for access to email are changed frequently (e.g. monthly, quarterly).
-
Client instructions received via email are authenticated.
-
Due diligence has been conducted on the cloud service providers, custodians and other third party vendors and evaluated as to whether they have documented safeguards against breaches.
-
All records are backed up off-site.
-
Address data security and/or encryption requirements when transmitting information.
Respond and Recover
-
A plan and procedure in place to immediately notify authorities and clients in the case of a security incident or breach.
-
A business continuity plan to implement in the event of a cybersecurity event.
-
A process for retrieving backed up data and archival copies of information.
-
Policies and procedures for employees regarding the storage and archival of information.