• Your Family. Your Home. Your Legal Needs. Our Priority.
The Law Office of Melissa A. Tocha

Cyber Security Security Policies and Procedures

Last Updated: March 21, 2019

Our company cyber security policy outlines our guidelines and provisions for preserving the security of our data and technology infrastructure. The more we rely on technology to collect, store and manage information, the more vulnerable we become to severe security breaches. Human errors, hacker attacks and system malfunctions can cause disruption in service to our clients and productivity in our office. For this reason, a number of security measures have been implemented and instructions have been issued that help mitigate security risks. These provisions are outlined in this policy and apply to all employees and anyone who has permanent or temporary access to our systems and hardware.

POLICY ELEMENTS
1. CONFIDENTIAL DATA:

Common examples are:

  1. a) financial information of clients;
  2. b) client lists (existing and prospective);
  3. c) lender lists;
  4. d) real estate company lists.

All employees are obliged to protect this data and avoid security breaches.

2. PERSONAL AND COMPANY DEVICES

This policy contains instructions on how to avoid security breaches, protect personal and company devices. When employees use their digital devices to access company emails or accounts, they introduce security risk to our data. All employees are instructed to keep their company issued computer and cell phone secure. This is done by the following:

  1. a) keeping all devices password protected;
  2. b) installing antivirus software;
  3. c) ensuring devices are not left exposed or unattended;
  4. d) install security updates of browsers and systems monthly or as soon as updates are available;
  5. e) log on to company accounts and systems through secure and private networks;
  6. f) avoiding accessing internal systems and accounts from other people’s devices or lending their own devices to others.

When new employees receive company-issued equipment they receive instructions for:

  1. a) encryption setup;
  2. b) password management;
  3. c) installation of antivirus/anti-malware software.
3. KEEPING EMAILS SAFE

Emails often contain scams and malicious software (e.g. worms.) To avoid virus infection or data theft, we instruct employees to:

  1. a) avoid opening attachments and clicking on links when the content is not adequately explained;
  2. b) be suspicious of clickbait titles (e.g. offering prizes, advice);
  3. c) check email and names of people they received a message from to ensure they are legitimate.
  4. d) look for inconsistencies (e.g. grammar mistakes, capital letters, excessive number of exclamation marks.) If an employee isn’t sure that an email they received is safe, they are instructed not to access the email and it will be referred to our IT Specialist.
4. MANAGE PASSWORDS PROPERLY

Password should be secure so they won’t be easily hacked. Employees are advised to:

  1. a) choose passwords with at least eight characters (including capital and lowercase letters, numbers and symbols);
  2. b) avoid information that can be easily guessed (e.g. birthdays.);
  3. c) change their passwords.
5. TRANSFERRING DATA

Transferring sensitive data (e.g. customer information, employee records) to other devices or accounts is done only when absolutely necessary. When transfer of such data is needed, it is done over the company network system and not over public Wi-Fi or private connection. We ensure that the recipients of the data are properly authorized and have adequate security policies.

6. SCAMS AND MALWARE

Employees are informed about scams, breaches and malware so they can better protect our infrastructure. Employees are advised to report perceived attacks, suspicious emails or phishing attempts as soon as possible. All reports are investigated promptly and a companywide alert is sent when necessary.

Everyone, from our clients and partners to our employees and contractors, should feel that their data is safe. This is done by proactively protecting our systems and databases, being vigilant and keeping cyber security a priority.