Endpoint / Mobile Security
Endpoint Security Policy
Users shall shutdown, logout or lock workstations when leaving them for any length of time.
It is recommended that workstations and laptops be restarted at minimum once every two weeks. 15.3. Workstations and laptops shall adhere to Virus and Malware Protection Policy
Define and implement endpoint build standards that include, at a minimum, the following:
Defined configurations based on industry best practice.
Authorized software
Anti-virus/anti-malware
Web Filtering/Cloud Access Security Broker (CASB)
Workstation access to the Internet shall be controlled based on assigned or departmental role.
Mobile Computing Policy
Ensure appropriate controls are in place to mitigate risks to protected information from mobile computing and remote working environments.
Data loss prevention processes and tools shall be implemented to identify and/or prevent data loss.
InnoSpark.ai data shall be removed from employee owned mobile devices within the timelines defined in termination policies.
Use of personally owned devices shall comply to acceptable use and information security policies if used to access Personal Data, PII or SCI data.
Devices owned by personnel shall never be used to access customer data, unless appropriate monitored controls, approved by Information Security, have been implemented.
Devices owned by personnel or authorized parties are not allowed to connect to corporate or production networks.
Employee owned mobile devices shall have the ability to connect to a network separate from the guest network, where feasible.
Ensuring compliance with data protection regulations.
Need Help : contact@innospark.ai
Corporate Office : 716, ILD Trade Centre, Sector-47, Gurugram, Haryana- 122018, India
Sales Office : 202, EF3 Mall, Mathura Road, Sector 20A, Faridabad, Haryana- 121001, India
InnoSpark Services Private Limited © 2024. All rights reserved.
CIN: U62013HR2024PTC122886
GISTIN: 06AAHCI7384P1ZR