Top Tips: Keeping Data Safe When Working Remotely

By John M. Benjamin and Edward Pickard

The coronavirus pandemic has had a severe impact on businesses right across the globe and with a third of the world now in lockdown, thousands of businesses have moved most of their workforce to remote working. Although working from home allows a business to continue operating, it brings significant security risks, placing a greater need to maintain compliance with relevant data security requirements.

Maintaining the security of company data is the responsibility of both the employer and employee and continuing to maintain appropriate security measures is critical at this time. Below are some key points for employees and businesses to keep data secure when working remotely.

  1. Secure Servers. Secure servers should be used when working remotely. In doing so, data can be accessed, altered, disclosed or deleted only by those with authority to do so. In particular, document management systems should be used so that documents received and/or edited can be saved to a company’s secure systems.

Documents should not be saved locally unless company approved security measures are in place.

  1. Devices. Where possible, company provided IT equipment should be used from home in order to protect and secure company data. The use of personal laptops and tablets creates greater risk as to the security of company’s data, particularly if other family members or others use those devices.

Employees should take particular care that they sign in and out of secure servers correctly and ensure that other users are unable to access company data when using personal devices.

  1. Screen Positioning. Leaving your device in plain view, where neighbors, passers-by, family members or others can see it, risks the security of the data on your screen. Employees should be aware of where they are working and ensure that they can only see their screen, including avoiding clear sight through windows, or communal areas of their homes where others may also be working. Employees should be encouraged to purchase privacy filters for their screens.
  1. Personal Email Accounts. When secure servers, printers or company mailboxes are not operating properly, employees might be tempted to forward emails and documents to their personal mailbox so they can access documents and data. Personal email accounts should not be used to view and review documents and emails as this severely risks the security of the data and is also likely to be against company policy.
  1. Printing. Printing documents when working from home can risk confidential information or personal data becoming inadvertently disclosed to parties who should not see it or simply picked up by outside parties through the documents being disposed of in the regular waste.

In order to maintain the security of data, it is important that employees only print documents when essential to do so. If printing, particular care should be taken to keep documents safe and secure until disposed of correctly.

  1. Disposing of documents. Many offices will have clear procedures around disposing of documents that contain confidential information, whether that be a shredder or confidential bins. Many employees will not have the same ability to deal with their documents in the same way, nor will they have access to locked cabinets. Consider whether the ability to install printers should be controlled by the company’s IT department. Consider also deploying software to track the volume of printing of company documents by a user, there will however be employee monitoring issues to be considered here.

In the same regard as our tips in relation to printing, you should take particular care that any confidential information, or documents containing personal data, are disposed of correctly. If an individual does not have access to a shredder, then documents should be held securely until such time as they can be disposed of correctly.

  1. Texting. Employees should be careful to avoid texting colleagues to discuss work of a confidential nature involving personal data that they would usually discuss in person. Employee’s mobile devices are unlikely to be as secure as company email or secure internal chat rooms, which should be used instead. Companies should consider controlling employees use of personal messaging and video conferencing solutions that have not been approved by the company’s IT department, as such solutions may not meet the information security standards required by the company.
  1. Training. As a final point, encourage employees to use this period to remind themselves of need to protect personal information, security obligations and relevant company policies. If necessary, they should be encouraged to take online privacy and security training.

Ensuring Employee Compliance and Data Security

  1. Secure Information Management. Regular and continuous management of your IT security systems. With employees accessing systems remotely, it is vitally important that businesses continually monitor, maintain and reinforce information security programs in order to protect the data held.
  2. Restrictions on Usage. Restricting how employees can use certain documents that contain large amounts of personal data or particularly sensitive data when working remotely. For example, restricting the ability to print/tracking printing of documents (see above) or limit documents to read-only mode.
  3. Remote Access Policy. A remote access policy can clearly outline employees’ requirements and responsibilities, and the security standards required when accessing company’s servers and data remotely.
  4. Own Device Policy. A policy setting out what is expected of your employees when they are using their own devices and the standards they need to maintain with their devices if using them for work.
  5. Online Awareness Training. Now might be the right time to ask employees to take online training refreshers in order to promote and maintain data protection compliance particularly when working from home for extended periods.

© 2009- Duane Morris LLP. Duane Morris is a registered service mark of Duane Morris LLP.

The opinions expressed on this blog are those of the author and are not to be construed as legal advice.

Proudly powered by WordPress