40
CONFIDENTIAL WHEN COMPLETED © The IASME Consortium Ltd 2018 All rights reserved © The IASME Consortium ltd 2018 All rights reserved. The copyright in this document is vested in The IASME Consortium ltd. The document must not be reproduced, by any means, in whole or in part or used for manufacturing purposes, except with the prior written permission of The IASME Consortium ltd and then only on condition that this notice is included in any such reproduction. Information contained in this document is believed to be accurate at the time of publication but no liability whatsoever can be accepted by any member of The IASME Consortium ltd arising out of any use made of this information. Compliance with this standard does not infer immunity from legal proceeding nor does it guarantee complete information security. . IASME Governance Self-Assessment Preparation Booklet Includes Assessment against Cyber Essentials and GDPR

IASME Governance Self-Assessment Preparation Booklet · CONFIDENTIAL WHEN COMPLETED © The IASME Consortium Ltd 2018 All rights reserved 1 IASME Governance, including Cyber …

  • Upload
    vancong

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

©TheIASMEConsortiumltd2018

Allrightsreserved.

ThecopyrightinthisdocumentisvestedinTheIASMEConsortiumltd.Thedocumentmustnotbereproduced,byanymeans,inwholeorinpartorusedformanufacturingpurposes,exceptwiththepriorwrittenpermissionofTheIASMEConsortiumltdandthenonlyonconditionthatthisnoticeis

includedinanysuchreproduction.

InformationcontainedinthisdocumentisbelievedtobeaccurateatthetimeofpublicationbutnoliabilitywhatsoevercanbeacceptedbyanymemberofTheIASMEConsortiumltdarisingoutofany

usemadeofthisinformation.

Compliancewiththisstandarddoesnotinferimmunityfromlegalproceedingnordoesitguaranteecompleteinformationsecurity.

.

IASME Governance Self-Assessment Preparation

Booklet Includes Assessment against Cyber Essentials and GDPR

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

1

IASMEGovernance,includingCyberEssentialsandGDPRcomplianceSelf-Assessment

Version10.8March2018

IntroductionThiscombinedquestionnaireexploresthetechnicalissuesoftheCyberEssentialsandthebroaderscopeoftheIASMEGovernanceStandard.TheEuropeanUnion’sGeneralDataProtectionRegulation(GDPR)requirementsarealsoincluded.BasedoncurrentgovernmentguidanceandpolicyitislikelythatanyorganisationproposingtooffergoodsandservicestoEUmembersstateswillneedtocomplywiththeEUGeneralDataProtectionRegulation(GDPR)fromMay2018.Thesearethequestionsyouwillbeaskedtocompletethroughtheonlineassessmentplatform.QuestionswhichapplyonlytotheIASMEgovernancestandardareinred,questionswhichapplyonlytotheGDPRrequirementsareinblueallotherquestionsapplytotheCyberEssentialsrequirementsandareinblack.

Allanswersareassessed.YouranswersmustbeapprovedbyaBoardlevelrepresentative,businessownerortheequivalent,otherwisecertificationcannotbeawarded.Pleaseanswerallthequestionstothebestofyourknowledgeandaddbriefnoteswithmostanswers.

AchievingcompliancewiththeCyberEssentialsprofileortheIASMEgovernancestandardindicatesthatyourorganisationhastakenthestepssetoutintheHMGCyberEssentialsSchemedocumentsorthebroaderIASMEgovernancestandard.ItdoesnotamounttoanassurancethattheorganisationisfreefromcybervulnerabilitiesandneitherIASMEConsortiumLimited(asAccreditationBody)northeCertificationBodyacceptsanyliabilitytocertifiedorganisationsoranyotherpersonorbodyinrelationtoanyreliancetheymightplaceonthecertificate.

A"pass"undertheGDPRassessmentdoesnotmeanthatyouareassessedasbeinglegallycompliant.Itindicatesonlythatyourorganisationisstartingonthepathwaytocomplianceandiscommittedtoensuring'privacybydesign'.

YoushouldensurethatyourorganisationobtainsspecialistlegaladviceontheGDPRasonanyotherdataprotectionissue.ThisGDPRassessmentisnotlegaladviceandmustnotberelieduponassuchandIASMEacceptsnoliabilityforlossordamagesufferedasaresultofrelianceonviewsexpressedhere.

ThefullextentoftheGDPRregimeanditsapplicationpostBrexit(forexample)isnotyetfullyknownbuttheassessmentaddresseswhatweconsidertobekeyelementsandtohelporganisationsdemonstrateprogresstowardsmeetingthepolicyobjectivesthatunderpinstheGDPR.

Ifyouareawardedacertificateyouwillalsobesentabadgetouseincorrespondenceandpublicityandmustaccepttheconditionsofuse.

FurtherguidanceontheCyberEssentialsschemecanbefoundat

https://www.cyberessentials.ncsc.gov.uk/requirements-for-it-infrastructure.html

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

2

Your Company

Pleasetellusalittleabouthowyourcompanyissetupsowecanaskyouthemostappropriatequestions.

1. Whatisyourorganisation'sname(forcompanies:asregisteredwithCompaniesHouse)?

2. Whatisyourorganisation'sregistrationnumber(ifyouhaveone)?

3. Whatisyourorganisation'saddress(forcompanies:asregisteredwithCompaniesHouse)?

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

3

4. Whatisyourmainbusiness?Agriculture,ForestryandFishingMiningandQuarryingManufacturingElectricity,Gas,SteamandAir-conditioningSupplyWatersupply,Sewerage,WastemanagementandRemediationConstructionWholesaleandRetailtradeRepairofmotorcarsandmotorcyclesTransportandstorageAccommodationandfoodservicesInformationandcommunicationFinancialandinsurance

RealestateProfessional,scientificandtechnicalAdministrationandsupportservicesPublicadministrationanddefenceCompulsorysocialsecurityEducationHumanHealthandSocialWorkArtsEntertainmentandRecreationOtherserviceactivitiesActivitiesofhouseholdsasemployers;undifferentiatedgoodsandservicesproducingforhouseholdsforownuseActivitiesofextraterritorialorganisationsandbodies

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

4

5. Whatisyourwebsiteaddress?

6. Whatisthesizeofyourorganisation?BasedontheEUdefinitionsofMicro(<10employees,<€2mturnover),Small(<50employees,<€10mturnover),Medium(<250employees,<€50mturnover)orLarge.

7. Howmanystaffarehomeworkers?Homeworkersarestaffwhosemainworklocationistheirhomeaddressandwhoworkthereforthemajorityoftheirtime.Thisdoesnotincludeofficeworkerswhooccasionallyworkathomeorwhentravelling.

Scope of Assessment

Pleasebrieflydescribetheelementsofyourorganisationwhichyouwanttocertifytothisaccreditation.Thescopeshouldbeeitherthewholeorganisationoranorganisationalsub-unit(forexample,theUKoperationofamultinationalcompany).Allcomputers,laptops,servers,mobilephones,tabletsandfirewalls/routersthatcanaccesstheinternetandareusedbythisorganisationorsub-unittoaccessbusinessinformationshouldbeconsidered"in-scope".Alllocationsthatareownedoroperatedbythisorganisationorsub-unit,whetherintheUKorinternationallyshouldbeconsidered"in-scope".

8. Doesthescopeofthisassessmentcoveryourwholeorganisation?

Pleasenote:YourorganisationisonlyeligibleforfreeCyberInsuranceifyourassessmentcoversyourwholecompany,ifyouanswer"No"tothisquestionyouwillnotbeinvitedtoapplyforinsurance.

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

5

9. Ifitisnotthewholeorganisation,thenwhatscopedescriptionwouldyouliketoappearonyourcertificateandwebsite?

10. Doesyourorganisationholdorprocesspersonaldata(asdefinedbyyourcountry'sdataprotectionlegislation)?

11. HaveyoucompletedaDataProtectionImpactAssessment,orPrivacyImpactAssessmentinthelast12months?

12. IsyourusageofpersonaldatasubjecttotheEUGDPR?IfyouholdandprocesspersonaldataaboutEUcitizens,youmustcomplywiththeEUGDPRwhereveryouarelocatedintheworld).

13. Pleasedescribethegeographicallocationsofyourbusinesswhichareinthescopeofthisassessment.

14. Pleaselistallequipmentwhichisincludedinthescopeofthisassessment(pleaseincludedetailsoflaptops,computers,servers,mobilephonesandtablets).

Alllaptops,computers,serversandmobiledevicesthatcanaccessbusinessdataandhaveaccesstotheinternetmustbeincludedinthescopeoftheassessment.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

6

15. Pleaseprovidedetailsofthenetworksthatwillbeinthescopeforthisassessment(suchasofficenetwork,homeofficesandfirewalls).

16. Pleaseprovidethenameandroleofthepersonwhoisresponsibleformanagingtheinformationsystemsinthescopeofthisassessment?

Managing Security

Pleasetellusabouthowyoumanagesecuritywithinyourorganisation.

17. Pleaseprovidethenameoftheboardmember/director/partner/trusteeidentifiedasresponsibleforinformationsecurityanddataprotection?

18. IsinformationsecurityanddataprotectionastandingagendaitemforyourBoardMeetings?

19. Pleaseprovidethenameandroleofthepersonwhohasoverallresponsibilityforsecurityinyourorganisation?Thisshouldbeanamedboardmemberordirector.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

7

20. Pleaseprovidethenameandroleofthepersonwhohasoverallresponsibilityfordataprotectioninyourorganisation?Thisshouldbeanamedboardmemberordirector.

21. Howdoyouensurethatyouprovidesufficientfundingandasuitablenumberofappropriatelyskilledstafftodevelopandmaintaingoodinformationsecurity?

Information Assets

Riskassessmentandrecoveryfrominformationandcybersecurityincidentsbothrelyonhavingagoodunderstandingofyourkeyinformationassets.Onlythencanyouappreciateyourattacksurfaceandwhatyou’vegottolose.Theimpactofanysecurityincidentwillbemostsevereifithappenstotheassetswhichkeeptheorganisationgoing.

22. Doesyourorganisationhaveuptodateassetregisters?

23. Howdoesyourassetmanagementsystemtrackyourownandothercompany'sintellectualpropertywithinyourorganisation?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

8

24. Howdoesyourassetregistertrackinformationassets(iecategoriesofinformation)?Aninformationassetmightbeasetofdata(forexample"employeeinformation")whichwillhavealocationattachedtoit(forexample"theserverintheHRdepartment")andanowner(forexamplethe"HRdirector").

25. Doallassets(bothphysicalandinformationassets)havenamedowners?

26. Howisremovablemediarecordedandmanaged?

27. Confirmanddescribehowallmobilephonesandtabletsaretrackedintheassetregister,pinorpasswordprotected,encryptedandremotelywipeable.Pleasedescribeallcriteriawithinthisquestion.

Thiscanbeachievedusingbuilt-intoolsoradditionalmobiledevicemanagementsoftware.

28. Isallpersonaldataandspecialcategorydataidentified(e.g.byprotectivemarking)andproperlyprotected?Describehowthisisdone.

29. Howdoyouensureallflowsofpersonalandspecialcategorydataaredocumentedincludingwheredatawasobtainedandalldestinationsofdata?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

9

30. Isallsensitiveinformationidentified(e.g.byprotectivemarking)andproperlyprotected?

31. Describehowyourprocessesallowdatasubjectstorequestchangestoincorrectdataordeletionofdata?

32. Whenassetsarenolongerrequired,isalldatasecurelywipedfromthemoraretheassetssecurelydestroyed?Describehowthisisdone.

Specialsoftwarecanbeusedtosecurelywipedataandexternalcompaniescanbeusedtoprovideasecuredestructionservice.

Cloud Services

Someorganisationsusepubliccloudservicestostoreorsharefilesbetweenemployees,suppliersandcustomers.CloudservicesincludeOffice365,GSuite(GoogleApps),Dropbox,SalesforceandAmazonWebServices(AWS).33. Doyouuseapubliccloudprovidertostoreorsharefilesandinformationbetweenemployees?Ifso,pleaselistallproviders.

34. Whereisthedatathatissenttoapubliccloudproviderstored?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

10

35. Ifyoustorepersonaldatawithyourcloudprovider,doyoustoreanyofthatdataoutsideoftheEuropeanEconomicArea(EEA)?

36. Ifyestotheabove,haveyouobtainedexplicitconsentfromdatasubjectstotransfertheirdataoutsideoftheEuropeanEconomicArea(EEA)?

37. Ifyestotheabove,doesyourprovidercertifytoanagreementsuchasEU-UKPrivacyShieldortootherbindingcorporaterulesthatconfirmthelevelofprotectiongiventothatdata?

38. Dothepubliccloudprovidersthatyourorganisationusesholdanyrecognisedsecurityaccreditations?

39. Isyourdataencryptedbeforebeingpassedbetweenyoursiteandthepubliccloudprovider(ieencryptedintransit)?

40. Isyourdataencryptedwhilstbeingstoredorprocessedbythepubliccloudprovider(ieencryptedatrest)?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

11

Risk Management

Itisimportanttoidentifythethreatstotheorganisationandassesstheresultingrisk.Theapplicabilityofthecontrolstoyourbusinessisdeterminedpartlybyariskassessmentandpartlybyyourriskappetite.IASMEknowsthattoofewSMEshaveaformalinformationriskassessment,norabusinessriskassessmentofanykind.However,theydohaveakeensenseoftherisksandfrailtyoftheirbusinessatboardlevel.TheorganisationshouldcreateandregularlyreviewRiskAssessments.

41. DoyouhaveacurrentRiskAssessment?

42. Hasyourriskassessmentbeenreviewedinthelast12months?Whoreviewedit?

43. Doestheriskassessmentcoverthescopeofthisassessment?

44. WastheriskassessmentapprovedatBoardLevel?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

12

Data Protection

Theorganisationshouldhaveapolicytomanagepersonaldataasdefinedbyyourcountry'sdataprotectionlegislation.TheInformationCommissioner’sOffice(ICO)websiteprovidesmoreinformationonthistopicintheUK.BasedoncurrentgovernmentguidanceandpolicyitislikelythatanyorganisationproposingtooffergoodsandservicestoEUmembersstateswillneedtocomplywiththeEUGeneralDataProtectionRegulation(GDPR)fromMay2018.

45. Haveyouputpoliciesandproceduresinplacetomitigateriskstopersonaldata?

46. Arethesepoliciesandproceduresprovidedtoallemployees,requiredtobefollowedineverydaypracticeandlinkedtodisciplinaryprocedures?Howdoyouachievethis?

47. IsDataProtectionreferredtoinemployeecontractsofemployment?

48. Dopoliciesandproceduressetclearresponsibilitiesforhandlingofpersonaldata,includingwhereappropriatereferencetoresponsibilitiesheldbyyourDataProtectionOfficer?

49. Whenyourorganisationcollectspersonaldatafromasubjectdoyouclearlystatewhatitisbeingcollectedfor,howitwillbeprocessedandwhowillprocessitanddoesthedatasubjecthavetoprovideconsentforthis?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

13

50. Whereyoucollectdatafromchildrendoyouactivelyseekparentalconsent?Howdoyourecordthis?

51. Doesyourriskassessmentcoverthemanagementofpersonaldataorspecialcategorydata?

52. WhatisyourprocessfordealingwithSubjectAccessorDataPortabilityrequestswithin30days?

Underdataprotectionlegislation,individualshavearighttoobtainacopyoftheinformationyouholdaboutthem.

53. Whatisyourprocessforcorrectinginaccuraterecords,deletingrecordsorsuspendingtheprocessingofrecords?

Underdataprotectionlegislation,individualshavetherighttohaveinaccuraciescorrectedandmayhavetherighttohaveinformationaboutthemdeletedfromsystems.

54. Doyouhavedocumenteddataretentionperiodsanddothesecovercontractualandlegalrequirements?

55. Doyouhavedocumenteddataclassificationcriteria?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

14

56. DoyouhaveadataprotectionordataprivacystatementcompliantwiththerequirementsoftheGeneralDataProtectionRegulation(GDPR)anddoesthestatementprovideapointofcontactfordataprotectionissues?Whoisthepointofcontact?

57. Whereyouareholdingdatabasedupontheconsentofthedatasubject,howdoyourecorddetailsoftheconsent?

58. Doyouhavemechanismsinplacewhichmakeitaseasyforthedatasubjecttoremoveconsentfordataprocessinganddoyouensureitisaseasytoremoveconsentasitwasforthemtogiveit?

59. Foreachpieceofpersonalinformationyouhold,doyourecordthepurposeforwhichitwasobtained?Whereisthisrecorded?

60. Foreachpieceofpersonalinformationyouhold,doyourecordthejustificationforobtainingit?Whereisthisrecorded?

Justificationsforobtainingtheinformationmightincludeexplicitconsent,contractfulfilment,performingapublicfunction,meetingalegalrequirementoranotherlegitimateinterest.

61. Foreachpieceofspecialcategorydatayouhold,doyourecordthejustificationforobtainingit?Whereisthisrecorded?

Justificationsforobtainingspecialcategory(orsensitivepersonaldata)couldincludespecificconsent,useforemploymentpurposesortomeetamedicalneed.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

15

62. Foreachpieceofpersonalinformationyouhold,doyourecordwhetheryourorganisationisthedataprocessororthedatacontroller?

63. Ineachcontractyouholdwithsuppliersandcustomersinvolvingtheprocessingofpersonaldata,doyouconfirmwhetheryouarethedatacontrollerordataprocessor?

64. Whereyoudisclosepersonaldatatoasupplier/providerdoesthecontractexplicitlyimposetheobligationtomaintainappropriatetechnicalandorganisationalmeasurestoprotectpersonaldatainlinewithrelevantlegislation?

People

Peopleareyourgreatestalliesinprotectingyourorganisation'sinformation.Theycanalsopresentariskbecausetheyhaveprivilegedaccesstoinformation.Itisimportantthereforetoensurethatyouknowasmuchaboutthemaspossiblebeforeyouemploythem.Thisisusuallydonebytakingupreferences,andincertaincasesthroughformalvettingprocedures.

Itisessentialthatnewemployeesaregivenabriefingontheircorporateandsecurityresponsibilitiesbefore,orimmediatelyafteremployment.Employeecontractsshouldalsoincludesecurityobligationsandremindersshouldtakeplaceatregularintervals.

Employeeswithspecialresponsibilityforsecurity,orwithprivilegedaccesstobusinesssystemsshouldbeadequatelytrained/qualifiedasappropriate.Onterminationofemployment,useraccessprivilegesshouldbeimmediatelywithdrawnandtheemployeede-briefedontheirpost-employmentconfidentialityresponsibilities.

65. Doyoutakeupreferencesand/orconfirmemploymenthistorywhenemployingnewstaff?Howdoyoudothis?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

16

66. Wherecriminalrecordchecksarecarriedout,doyouensurethatexplicitconsenthasbeenobtainedfromemployeesandthatsuchchecksarecarriedoutforlawfulpurposes?

67. Providethenameandroleofthepersonresponsibleforsecurityanddataprotectiontrainingandawareness.

68. Doallstaffandcontractorsreceiveregularinformationsecurityanddataprotectiontraining(atleastannually)?Describehowthisisdone.

69. Doyougivenewemployeesabriefingontheircorporateandsecurityresponsibilitiesbefore,orimmediatelyafteremployment,preferablyreinforcedbyreferenceliterature?Howdoyoudothis?

70. Doemployeecontractsincludesecurityobligations(suchasanobligationtocomplywiththesecuritypolicy)andareremindersgivenatregularintervals?

71. Areemployeeswithresponsibilityforinformationsecurity,orwithprivilegedaccesstobusinesssystems,appropriatelyqualifiedandsuitablytrained?

72. Onterminationofemployment,areuseraccessprivilegesimmediatelywithdrawnandtheemployeede-briefedontheirpost-employmentconfidentialityresponsibilities?Howdoyoudothis?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

17

Security Policy

Theorganisationmusthaveanimplementedsecuritypolicytomatchitsriskprofile.ThisisusuallytheultimateresponsibilityoftheCIO/Director.

IASMEprovidesamodeltemplatepolicywhichcanbeadaptedtotheindividualcircumstancesofmostorganisations.

Datesforachievingobjectivescanbesetwithinthepolicy,whichshouldbereviewedbytheBoardatregularintervalsorwhensecurityincidentsoccurorchangesintheriskthelandscapeemerge.

73. DoyouhaveacurrentSecurityPolicy?

ASecurityPolicycanbestand-aloneorincorporatedintootherpolicy,butitshouldsetoutyourobjectivesformanagingyoursecurity.

74. HasyourPolicybeenreviewedinthelast12months?

75. DoesthePolicycoverthescopeofthisassessment?

76. Providethenameandroleofthepersonwhoapprovedthepolicy?

77. Isthereapolicyreviewandconsultationprocess?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

18

78. DoesthepolicyrefertoIntellectualPropertyRightsandlegalrequirements?

79. Doesthepolicyrefertopersonnelsecurity?

80. Doesthepolicyrefertoassetmanagement?

81. Doesthepolicyrefertoaccessmanagement?

82. Doesthepolicyrefertophysicalandenvironmentalsecurity?

83. Doesthepolicyrefertocomputerandnetworksecurity?

84. Doesthepolicyrefertosecurityfrommalwareandintrusion?

85. Doesthepolicyrefertosecurityincidentmanagement?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

19

86. Doesthepolicyrefertobusinesscontinuitymeasures?

87. Doesthepolicyrefertohandlingpersonaldata(and,whereappropriate,referenceyourdataprotectionpolicy)?

88. Isthepolicydistributedtoallemployees?

89. Isthesecuritypolicypartofallemployees’contractualobligations?

90. Dothecontractswithallyoursuppliersensurethattheymeettherequirementsofyoursecuritypolicyaroundhandlingdataandkeepinginformationsecure?

91. Listanybusinesssector-specificlaws/regulationsrelatingtorisktreatmentorinformationsecuritywhichapplytoyourbusiness.

92. ListanyUKorEUlaws/regulationsrelatingtorisktreatmentorinformationsecuritywhichapplytoyourbusiness.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

20

93. ListanyotherInternationallegislation/regulationsrelatingtorisktreatmentorinformationsecuritywhichapplytoyourbusiness.

94. Doyoustorecreditcardinformation?

95. Ifyestoabove,arethesystemsthatyouusetostorecreditcardinformationcomplianttoPCI-DSSregulation?

96. Isyourbusinesspartofapublicglobalorganisationthatisrequiredtohaveexternalfinancialreporting?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

21

Physical and Environmental Protection

Protectionofyourinformationandcybersecurityextendstothephysicalprotectionofinformationassetstopreventtheft,loss,ordamageandtheirimpactontheavailabilityofyourbusinessinformationandassociatedresources.

Usuallythisisnomorethanthecommonsenseapproachtodoorlocks,windowbars,andvideosurveillanceetc,asdictatedbytheorganisation’sphysicalenvironment.However,insomecases,physicalprotectionmaybedictatedbygovernmentalorlegalrequirements.

Ifyourequipmentrequiresanyparticularworkingconditions–suchasheating,ventilation,orairconditioning(HVAC)–becarefultomaintainthesewithintheguidelinessetoutbytherespectivemanufacturers.

97. Areonlyauthorisedpersonnelwhohaveajustifiedandapprovedbusinesscasegivenaccesstorestrictedareascontaininginformationsystemsorstoreddata?Howdoyouachievethis?

98. Aredeviceswhichrequireparticularworkingconditions-suchasheatingandcooling-providedwithasuitableenvironmentwithintheguidelinessetoutbytheirrespectivemanufacturers?Howdoyouachievethis?

99. Doallbusinesspremiseshaveeffectivephysicalprotectionand,ifindicatedbyariskassessment,surveillanceandmonitoring?Howdoyouachievethis?

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

22

Office Firewalls and Internet Gateways

Firewallisthegenericnameforsoftwareorhardwarewhichprovidestechnicalprotectionbetweenyoursystemsandtheoutsideworld.Therewillbeafirewallwithinyourinternetrouter.CommoninternetroutersareBTHomeHub,VirginMediaHuborSkyHub.Yourorganisationmayalsohavesetupaseparatehardwarefirewalldevicebetweenyournetworkandtheinternet.Firewallsarepowerfuldevicesandneedtobeconfiguredcorrectlytoprovideeffectivesecurity.Questionsinthissectionapplyto:HardwareFirewalldevices,Routers,ComputersandLaptopsonly

100. Doyouhavefirewallsattheboundariesbetweenyourorganisationsinternalnetworksandtheinternet?Youshouldhavefirewallsinplacebetweenyourofficenetworkandtheinternet.Youshouldalsohavefirewallsinplaceforhome-basedworkers,ifthoseusersarenotusingaVirtualPrivateNetwork(VPN)connectedtoyourofficenetwork.Remembermostinternet-routerscontainafirewall.

101. Whenyoufirstreceiveaninternetrouterorhardwarefirewalldeviceitwillhavehadadefaultpasswordonit.Hasthisinitialpasswordbeenchangedonallsuchdevices?Howdoyouachievethis?

102. Isthenewpasswordonallyourinternetroutersorhardwarefirewalldevicesatleast8charactersinlengthanddifficulttoguess?

Apasswordthatisdifficulttoguesswillnotbemadeupofcommonorpredictablewordssuchas"password"or"admin",orincludepredictablenumbersequencessuchas"12345".

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

23

103. Doyouchangethepasswordwhenyoubelieveitmayhavebeencompromised?Howdoyouachievethis?

104. Doyouhaveanyservicesenabledthatareaccessibleexternallyfromyourinternetroutersorhardwarefirewalldevicesforwhichyoudonothaveadocumentedbusinesscase?Attimesyourfirewallmaybeconfiguredtoallowasystemontheinsidetobecomeaccessiblefromtheinternet(suchasaserveroravideoconferencingunit).Thisissometimesreferredtoas"openingaport".Youneedtoshowabusinesscasefordoingthisbecauseitcanpresentsecurityrisks.Ifyouhavenotenabledanyservices,answer"No".

105. Ifyoudohaveservicesenabledonyourfirewall,doyouhaveaprocesstoensuretheyaredisabledinatimelymannerwhentheyarenolongerrequired?Describetheprocess.

106. Haveyouconfiguredyourinternetroutersorhardwarefirewalldevicessothattheyblockallotherservicesfrombeingadvertisedtotheinternet?

Bydefault,mostfirewallsblockallservicesfrominsidethenetworkfrombeingaccessedfromtheinternet,butyouneedtocheckyourfirewallsettings.

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

24

107. Areyourinternetroutersorhardwarefirewallsconfiguredtoallowaccesstotheirconfigurationsettingsovertheinternet?

Sometimesorganisationsconfiguretheirfirewalltoallowotherpeople(suchasanITsupportcompany)tochangethesettingsviatheinternet.IfyouhavenotsetupyourfirewallstobeaccessibletopeopleoutsideyourorganisationsoryourdeviceconfigurationsettingsareonlyaccessibleviaaVPNconnection,thenanswer"no"tothisquestion.

108. Ifyes,isthereadocumentedbusinessrequirementforthisaccess?

109. Ifyes,istheaccesstothesettingsprotectedbyeithertwo-factorauthenticationorbyonlyallowingtrustedIPaddressestoaccessthesettings?Listwhichoptionisused.

110. Doyouhavesoftwarefirewallsenabledonallofyourcomputersandlaptops?YoucancheckthissettingonMaclaptopsintheSecurity&PrivacysectionofSystemPreferences.OnWindowslaptopsyoucancheckthisbygoingtoSettingsorControlPanelandsearchingfor"windowsfirewall".

111. Ifno,isthisbecausesoftwarefirewallsarenotcommonlyavailablefortheoperatingsystemyouareusing?Pleaselisttheoperatingsystems.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

25

Secure Configuration

Computersareoftennotsecureupondefaultinstallation.An‘out-of-the-box’set-upcanoftenincludeanadministrativeaccountwithastandard,publiclyknowndefaultpassword,one orormoreunnecessaryuseraccountsenabled(sometimeswithspecialaccessprivileges)andpre-installedbutunnecessaryapplicationsorservices.Allofthesepresentsecurityrisks.

Questionsinthissectionapplyoperatingsystemsandapplicationsrunningon:Servers,Computers,Laptops,TabletsandMobilePhones.

112. Whereyouareabletodoso,haveyouremovedordisabledallthesoftwarethatyoudonotuseonyourlaptops,computers,servers,tabletsandmobilephones?Describehowyouachievethis.Thisincludesapplications,systemutilitiesandnetworkservices.

113. Haveyouensuredthatallyourlaptops,computers,servers,tabletsandmobiledevicesonlycontainnecessaryuseraccountsthatareregularlyusedinthecourseofyourbusiness?

114. Haveyouchangedthedefaultpasswordforalluserandadministratoraccountsonallyourlaptops,computers,servers,tabletsandsmartphonestoanon-guessablepasswordof8charactersormore?

115. Doallyourusersandadministratorsusepasswordsofatleast8characters?Astrongpasswordtypicallyisamixtureofatleast8characters,numbersandsymbols,thelongerthebetter.

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

26

116. Doyourunsoftwarethatprovidessensitiveorcriticalinformation(thatshouldn'tbemadepublic)toexternalusersacrosstheinternet?

117. Ifyes,doyouensureallusersoftheseservicesuseapasswordofatleast8charactersandthatyoursystemsdonotrestrictthelengthofthepassword?

118. Ifyes,doyouensurethatyouchangepasswordsifyoubelievethattheyhavebeencompromised?

119. Ifyes,areyoursystemssettolockoutaftertenorfewerunsuccessfulloginattempts,orlimitthenumberofloginattemptstonomorethantenwithinfiveminutes?

120. Ifyes,doyouhaveapasswordpolicythatguidesallyourusers?Thepasswordpolicymustinclude:guidanceonhowtochoosenon-guessablepasswords,nottousethesamepasswordformultipleaccounts,whichpasswordsmaybewrittendownandwheretheycanbestored,andiftheymayuseapasswordmanager.

121. Is"auto-run"or"auto-play"disabledonallofyoursystems?ThisisasettingwhichautomaticallyrunssoftwareonaDVDormemorystick.Youcandisable"auto-run"or"auto-play"throughcontrolpanel/systempreferences.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

27

Software Patching Toprotectyourorganisation,youshouldensurethatyoursoftwareisalwaysup-to-datewiththelatestupdatesor“patches”.If,onanyofyourin-scopedevices,youareusinganoperatingsystemwhichisnolongersupported,e.g.MicrosoftWindowsXPormacOSMountainLion,andyouarenotbeingprovidedwithupdatesfromanotherreliablesource,thenyouwillnotbeawardedcertification.Mobilephonesandtabletsarein-scopeandmustalsouseanoperatingsystemthatisstillsupportedbythemanufacturer.

Questionsinthissectionapplyto:Servers,Computers,Laptops,Tablets,MobilePhones,RoutersandFirewalls.122. Arealloperatingsystemsandfirmwareonyourdevicessupportedbyasupplierthatproducesregularfixesforanysecurityproblems?Pleaselistanyoperatingsystemsthatarenotsupported.

123. Areallapplicationsonyourdevicessupportedbyasupplierthatproducesregularfixesforanysecurityproblems?Pleaselistanyapplicationsthatarenotesupported.

124. Isallsoftwarelicensedinaccordancewiththepublisher’srecommendations?

125. Areallhigh-riskorcriticalsecurityupdatesforoperatingsystemsandfirmwareinstalledwithin14daysofrelease?Describehowdoyouachievethis.

126. Areallhigh-riskorcriticalsecurityupdatesforapplications(includinganyassociatedfilesandanypluginssuchasAdobeFlash)installedwithin14daysofrelease?Describehowyouachievethis.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

28

127. Haveyouremovedanyapplicationsonyourdevicesthatarenolongersupportedandnolongerreceivedregularfixesforsecurityproblems?

Operations and Management

Yourorganisationneedstoensurethatmanagementofcomputers,networksanddevicesiscarriedoutinacontrolledmannertoensurethatchangestoconfigurationareonlyimplementedwithauthorisation.Thisensuresyoursecurityenvironmentremainsappropriatefortheorganisation.

128. Ismanagementofcomputersandnetworkscontrolledusingdocumentedproceduresthathavebeenauthorised?Describehowyouachievethis.

129. Doestheorganisationensurethatallnewandmodifiedinformationsystems,applicationsandnetworksincludesecurityprovisions,arecorrectlysized,complywithsecurityrequirements,arecompatiblewithexistingsystemsandareapprovedbeforetheycommenceoperation?Describehowyouachievethis.

130. Wherepersonaldataisinuse,doyouensurethataprivacyimpactassessmentiscarriedoutfornewsystemsandprojects?

131. Arechangestoinformationsystems,applicationsornetworksreviewedandapproved?Describetheapprovalprocess.

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

29

132. Howdoyouensurethatallyoursuppliers(includingcloudprovidersandsub-contractors)followinformationsecurityproceduresthatarecertifiedtobethesameas,ormorecomprehensivethan,theinformationsecurityproceduresfollowedbyyourownorganisationforthedatainvolvedinthatcontract?AnexampleofsuchcertificationwouldbeanindependentauditofthewholebusinesstoISO27001,theIASMEGovernancestandardorCyberEssentials.

User Accounts Itisimportanttoonlygiveusersaccesstotheresourcesanddatanecessaryfortheirroles,andnomore.Allusersneedtohaveuniqueaccountsandshouldnotbecarryingoutday-to-daytaskssuchasinvoicingordealingwithe-mailwhilstloggedonasauserwithadministratorprivilegeswhichallowsignificantchangestothewayyourcomputersystemswork.

Questionsinthissectionapplyto:Servers,Computers,Laptops,TabletsandMobilePhones.

133. Areusersonlyprovidedwithuseraccountsafteraprocesshasbeenfollowedtoapprovetheircreation?Describetheprocess.

134. Canyouonlyaccesslaptops,computersandserversinyourorganisation(andtheapplicationstheycontain)byenteringauniqueusernameandpassword?

135. Howdoyouensureyouhavedeleted,ordisabled,anyaccountsforstaffwhoarenolongerwithyourorganisation?

Whenanindividualleavesyourorganisation,youneedtostopthemaccessinganyofyoursystems.

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

30

136. Doyouensurethatstaffonlyhavetheprivilegesthattheyneedtodotheircurrentjob?Howdoyoudothis?Whenastaffmemberchangesjobroleyoumayalsoneedtochangetheiraccessprivileges.

Administrative Accounts

Useraccountswithspecialaccessprivileges(e.g.administrativeaccounts)typicallyhavethegreatestlevelofaccesstoinformation,applicationsandcomputers.Whentheseprivilegedaccountsareaccessedbyattackerstheycancausethemostamountofdamagebecausetheycanusuallyperformactionssuchasinstallmalicioussoftwareandmakechanges.Specialaccessincludesprivilegesoverandabovethoseofnormalusers.Itisnotacceptabletoworkonday-to-daybasisinaprivileged“administrator”mode.

Questionsinthissectionapplyto:Servers,Computers,Laptops,TabletsandMobilePhones.

137. Doyouhaveaformalprocessforgivingsomeoneaccesstosystemsatan“administrator”level?Describetheprocess.

138. Howdoyouensurethatstaffonlyuseadministratoraccountstocarryoutadministrativeactivities(suchasinstallingsoftwareormakingconfigurationchanges)?

139. Howdoyouensurethatadministratoraccountsarenotusedforaccessingemailorwebbrowsing?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

31

140. Doyouformallytrackwhichusershaveadministratoraccountsinyourorganisation?

141. Doyoureviewwhoshouldhaveadministrativeaccessonaregularbasis?

142. Haveyouenabledtwo-factorauthenticationforaccesstoalladministrativeaccounts?

143. Ifno,isthisbecausetwo-factorauthenticationisnotavailableforsomeorallofyourdevicesorsystems?Listthedevicesorsystemsthatdonotallowtwo-factorauthentication.

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

32

Malware protection Malware(suchascomputerviruses)isgenerallyusedtostealordamageinformation.Malwareareoftenusedinconjunctionwithotherkindsofattacksuchas‘phishing’(obtaininginformationbyconfidencetrickery)andsocialnetworksites(whichcanbeminedforinformationusefultoahacker)toprovideafocussedattackonanorganisation.Anti-malwaresolutions(includinganti-virus)areavailablefromcommercialsuppliers,somefree,butusuallyascompletesoftwareandsupportpackages.Malwarearecontinuallyevolving,soitisimportantthatthesupplierincludesbothmalwaresignaturesandheuristicdetectionfacilitieswhichareupdatedasfrequentlyaspossible.Anti-malwareproductscanalsohelpconfirmwhetherwebsitesyouvisitaremalicious.Questionsinthissectionapplyto:Computers,Laptops,TabletsandMobilePhones.144. Areallofyourcomputers,laptops,tabletsandmobilephonesprotectedfrommalwarebyeither

A-havinganti-malwaresoftwareinstalled,B-limitinginstallationofapplicationstoanapprovedset(ieusinganAppStoreorapplicationwhitelisting)or

C-applicationsandboxing(iebyusingavirtualmachine)?

145. IfOptionA:Whereyouhaveanti-malwaresoftwareinstalled,isitsettoupdatedailyandscanfilesautomaticallyuponaccess?Thisisusuallythedefaultsettingforanti-malwaresoftware.

146. IfOptionA:Whereyouhaveanti-malwaresoftwareinstalled,isitsettoscanwebpagesyouvisitandwarnyouaboutaccessingmaliciouswebsites?

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

33

147. IfOptionB:Whereyouuseanapp-storeorapplicationsigning,areusersrestrictedfrominstallingunsignedapplications?

Bydefault,mostmobilephonesandtabletsdonotallowyoutoinstallunsignedapplications.Usuallyyouhaveto"root"or"jailbreak"adevicetoallowunsignedapplications.

148. IfOptionB:Whereyouuseanapp-storeorapplicationsigning,doyouensurethatusersonlyinstallapplicationsthathavebeenapprovedbyyourorganisationanddoyoudocumentthislistofapprovedapplications?

149. (C)Whereyouuseapplicationsandboxing,doyouensurethatapplicationswithinthesandboxareunabletoaccessdatastores,sensitiveperipheralsandyourlocalnetwork?Describehowyouachievethis.Ifyouareusingavirtualmachinetosandboxapplications,youcanusuallysetthesesettingswithintheconfigurationoptionsofthevirtualmachinesoftware.

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

34

Vulnerability Scanning AvulnerabilityscanisatechnicalexaminationofthesecuritystatusofyourITsystem.Itcanbeperformedbyanexpertorbysomeautomatictoolsandcanhelpyouanswerandprovideevidenceforsomeofthefollowingquestions.Somescanningtoolsareevenavailabletodownloadforfreefromtheinternet.Youcanalsouseacontinuousvulnerabilityscanningtooltomonitoryourongoingvulnerabilities.Pleasenotethatwedonotendorseanyparticularproduct.

150. Whenwasthelasttimeyouhadavulnerabilityscanonyoursystem?

151. Howdidyouacttoimprovethesecurityofyoursystemonthebasisofthescanresults?

Monitoring Monitoringcanhelpidentifysuspiciousactivityonyoursystems.Knowwhichbusinesssystemsandprocessesyouneedtotrackandmonitorforacceptableactivity–accordingtheinformationsafetypoliciesthatyouhaveset-andhowyouwillidentifyanyunacceptableaspects.

152. Doestheorganisationregularlyrevieweventlogs?

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

35

153. Isanaudittrailofsystemaccessand/ordatausebystaffmaintainedandreviewedonaregularbasis?Describehowyouachievethis.

Backup and Restore Keyinformationshouldbebackedupregularlyandthebackupspreferablykeptinasecurelocationawayfromthebusinesspremises.Restoresshouldbetestedregularlyinordertotesttheperformanceofthebackupregime.

154. Aredatastoredonthebusinesspremisesbackedupregularly(atleastweekly)andrestorestestedatappropriateintervals(atleastmonthly)?

155. Areallbackupssecuredwithanappropriatelevelofprotectionforthetypeofdatatheycontain?

156. Isabackupcopyheldinadifferentphysicallocation?

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

36

Incident Management Allorganisationsshouldhavesecurityincidentmanagementprocedurestoallowanyincidents(suchaslossofdata,malwareinfectionsandphishingattacks)tobedealtwithsuccessfully.Itisimportantthatincidentsareeasytoreporttoaresponsibleentitywithoutblameandthattheorganisationlearnsthelessonsfromincidents.157. Areuserswhoinstallsoftwareorotheractivecodeontheorganisation’ssystemswithoutpermissionsubjecttodisciplinaryaction?

158. Areallinformationsecurityincidentsorsuspectedweaknessesreportedandrecorded,anddoyouprovideamethodforallemployeesandcontractorstoreportsecurityincidentswithoutriskofrecrimination(oranonymously)?

159. WhatisyourprocessforreportinglossesofpersonaldatatotheInformationCommissioner(oryournationaldataprotectionauthority)andthedatasubjects?

160. Areinformationsecurityincidentsinvestigatedtoestablishtheircauseandimpactswithaviewtoavoidingsimilarevents?

161. Ifrequiredasaresultofanincident,isdataisolatedtofacilitateforensicexamination?Howisthisdone?

162. Isarecordkeptoftheoutcomeofallsecurityincidentinvestigations?

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

37

Business Continuity Plansforrecoveryandcontinuityshouldbedrawnupandreviewedregularly,andtestedinwholeorinpartsothatparticipantsintheplanunderstandtheirresponsibilities.Theaimisisfortheorganisationtokeepworkingthrough,andrecoverfrom,theeffectsofdeliberateattack,accidentaldamage,andnaturaldisasters.

163. Doestheorganisationensurethatbusinessimpactassessment,businesscontinuityanddisasterrecoveryplansareproducedforallmissioncriticalinformation,applications,systemsandnetworks?

164. Doestheorganisationreviewthebusinesscontinuityanddisasterrecoveryplansatleastonceperyearandwhoisinvolvedinthereview?

165. Doestheorganisationexercisethebusinesscontinuityanddisasterrecoveryplansatleastonceperyear?

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

38

InsuranceAllorganisationswithaheadofficedomiciledintheUKthathavethewholecompanyinscopeandaturnoverof<£20mgetautomaticcyberinsuranceiftheyachieveCyberEssentialscertification.Thecostofthisisincludedintheassessmentpackagebutyoucanoptoutoftheinsuranceelementifyouchoose.Thiswillnotchangethepriceoftheassessmentpackage.Ifyouwanttheinsurancethenwedoneedtoasksomeadditionalquestionsandtheseanswerswillbeforwardedtothebroker.TheanswerstothesequestionswillnotaffecttheresultofyourCyberEssentialsassessment.166. IsyourheadofficedomiciledintheUKandisyourgrossannualturnoverlessthan£20m?

Theanswertothisquestionisjustforinformationand,ifyouareeligiblefortheinsuranceandoptin,willbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertification.

Ifyouhaveanswered"yes"tothelastquestion,thenyourcompanyiseligiblefortheincludedcyberinsuranceifyougaincertification.Thecostoftheinsuranceisincludedinthecostoftheassessment

167. Doyouwanttoacceptthiscyberinsurance?Theanswertothisquestionisjustforinformationand,ifyouareeligiblefortheinsuranceandoptin,willbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertification.

168. Whatisyourtotalgrossrevenue?Youonlyneedtoanswerthisquestionifyouaretakingtheinsurance.TheanswertothisquestionisjustforinformationandwillbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertification.

[Notes]

[Notes]

[Notes]

CONFIDENTIALWHENCOMPLETED

© The IASME Consortium Ltd 2018 All rights reserved

39

169. Isthecompanyoritssubsidiariesanyofthefollowing:medical,callcentre,telemarketing,dataprocessing(outsourcers),internetserviceprovider,telecommunicationsoranorganisationregulatedbytheFCA?Youonlyneedtoanswerthisquestionifyouaretakingtheinsurance.TheanswertothisquestionisjustforinformationandwillbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertification.

170. DoesthecompanyhaveanydomiciledoperationorderivedrevenuefromtheterritoryorjurisdictionofCanadaand/orUSA?Youonlyneedtoanswerthisquestionifyouaretakingtheinsurance.TheanswertothisquestionisjustforinformationandwillbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertification.

171. Whatistheorganisationemailcontactfortheinsurancedocuments?Youonlyneedtoanswerthisquestionifyouaretakingtheinsurance.TheanswertothisquestionwillbepassedtotheInsuranceBrokerinassociationwiththeCyberInsuranceyouwillreceiveatcertificationandtheywillusethistocontactyouwithyourinsurancedocumentsandrenewalinformation.

[Notes]

[Notes]

[Notes]