4.2 Removable Media Devices
Our stance on the use of removable media such as USB drives is clear: we consider it a significant security risk and strictly control, or where feasible, prohibit its usage. This stringent approach stems from our commitment to preventing the introduction of malware, as well as stopping unauthorized data extraction.
In instances where the use of removable media is deemed essential for specific business operations, we ensure that only company-provided and approved devices are used. These devices are subject to the same high standards as our internal hardware, featuring strong encryption and undergoing regular checks for any security threats.
To maintain control over our data, we meticulously keep track of all issued removable media. Inventory logs record the allocation of each device, tracking its usage, and recording when data is transferred to and from the device.
Once removable media has fulfilled its purpose, secure disposal practices are initiated. This involves a rigorous process to ensure the permanent erasure of all data, including multiple data overwrites or physical destruction of the device to prevent any possible recovery of the stored information.
Last updated