Information Transfer Policy

Details

DateVersionStatusInformation ClassificationDocument Template IDDocument No
08-01-20201.4ApprovedInternalAMS DOCAMS-SP-06

Revision History

DateVersionDescriptionAuthorReviewed byApproved byApproved date
17-05-20151.0Initial VersionPraveenPremanandPremanand
24-03-20161.1Reviewed and no change required
31-07-20171.1Reviewed and no change required
10-08-20171.2Replaced shall with will
25-03-20191.3Reviewed and no change requiredPraveen
24-12-20191.4Changes made as per the standard DocumentUshaShailaSuresh Kumar B V08-01-2020
## Acronym Used
AcronymExpanded Form

Purpose

To protect the transfer of information belongs to ASL and its customers through the use of all type of communication facilities.

ISO27001 Control Reference

  • A.13.2.1 Information transfer policies and procedures

  • A.13.2.2 Agreements on information transfer

  • A.13.2.3 Electronic messaging

  • A.13.2.4 Confidentiality or non-disclosure agreements

Applicability

This policy applies to any confidential/restricted information that is exchanged through electronic mail, voice, facsimile and video.

  • Transferred information will be protected from interception, copying, modification misrouting and destruction. (Ref: Network control policy and communication security process)

  • Apply methods for detection and protections against malicious code that may be transmitted through use of electronic communications.

  • Protecting communicated sensitive electronic information that is in form of an attachment.

  • Controls and restrictions associated with the sending and forwarding of emails to external email addresses

  • Formulate a guideline for Acceptable Use of electronic communication facilities. (Ref: Acceptable Usage policy)

  • Procedures for wireless communications (hand held communication devices like smart phone), taking into account particular risks involved.

  • Use of cryptographic techniques to protect the confidentiality, integrity and authenticity of information wherever possible.

  • Employee, contractor, and any other user's responsibilities not to compromise the organization, e.g. through defamation, harassment, impersonation, forwarding of chain letters unauthorized purchasing.

  • Retention and disposal guidelines for all business correspondence including messages, in accordance with applicable rules and regulations of Republic of India and other countries with direct business relations (e.g., Malaysia).

  • Not leaving sensitive or critical information on printing facilities, e.g. copiers, printers and facsimile machines, as these may be accessed by unauthorized personnel.

  • Restricting software downloading from internet.

  • Acceptable Usage policy of assets will be applied consistently with this policy.

Agreements on information transfer

  • Agreements are established for information exchange and software (e.g., Tender wizard, Auction wizard, and/or other developed applications.) between external parties and ASL.

  • Prior to the transfer of information with external organization, a formal and an appropriate SLA with an adequate level of security controls shall be defined. This agreement shall cover, but not be limited to:

    • Management responsibilities

    • Manual and electronic exchanges

    • Sensitivity of the critical information being exchanged

    • Protection requirements.

    • Notification requirements

    • Packaging and transmission standards.

    • Courier identification.

    • Responsibilities and liabilities.

    • Data and software ownership

    • Protection responsibilities and measures.

    • Encryption requirements.

  • The following security conditions can also be considered while considering exchange agreements:

    • Management responsibilities for controlling and notifying transmission, dispatch and receipt

    • Procedures for notifying sender of transmission, dispatch and receipt

    • Procedure to ensure traceability and non-repudiation

    • Follow a prescribed minimum technical standard for packaging and transmission (if needed)

    • Responsibilities and liabilities in event of information security incidents, such as loss of data

    • Use of an agreed labeling system for sensitive or critical information, ensuring that the meaning of labels is immediately understood and that information is appropriately protected

    • Ownership and responsibilities for data protection, copyright, and software license compliance

    • The security content of any agreement should reflect the sensitivity of the business information involved.

    • Agreements may be manual or electronic, and may take the form of formal contract or conditions of employment.

Confidentiality or Non-disclosure agreements

  • Requirements for confidentiality or non-disclosure agreements reflecting the organizations needs for the protection of information are identified, regularly reviewed and documented.

  • Confidentiality or NDA are addressing the requirement to protect confidential information using legally enforceable terms and are applicable to external parties and employees of the organization. Elements are selected and added in consideration of the type of the other party and its permissible access or handling of confidential information. To identify requirements for confidentiality or non-disclosure agreements the following are considered

    • The information to be protected are defined

    • Expected duration of an agreement including cases where confidentiality might need to be maintained indefinitely.

    • Actions to be taken when agreement is terminated

    • Responsibilities and actions of signatories to avoid unauthorized information disclosure

    • Ownership of information , trade secrets and intellectual property, and how this relates to the protection of confidential information

    • The permitted use of confidential information and rights of the signatory to use information

    • The right to audit and monitor activities that involve confidential information

    • Process for notification and reporting of unauthorized disclosure or confidential information leakage

    • Terms for information to be returned or destroyed at agreement cessation

    • Expected actions to be taken in case of breach of agreement

    • By complying all applicable laws and regulations for the jurisdiction

    • By complying organization information security requirements

  • The requirements for confidentiality and non-disclosure agreements are to be reviewed periodically and when changes occur that influence these requirements.

Electronic Messaging

ASL has taken the following considerations for electronic messaging:

  • Protecting messages from unauthorized access, modification or denial of service commensurate classification scheme (Ref: information classification policy). Protections are implemented at server and gateway levels of information processing systems.

  • Ensuring correct addressing and transportation of message.

  • Reliability and availability of the service

  • Legal considerations -- where ever applicable electronic signatures are being used for transferring the information through electronic medium.

  • Use of external public services such as blogs, instant messaging, social networking or file sharing are prohibited , however on un avoidable conditions these medium can be used after obtaining senior management approval.

  • Authentication methodology is stringent to control the access from public networks.