Information Security Manual
Information Security Manual
Confidential Page 1 of 59
Information Security Manual
Revision History
Confidential Page 2 of 59
Information Security Manual
Confidential Page 3 of 59
Information Security Manual
Confidential Page 4 of 59
Information Security Manual
Contents
Confidential Page 5 of 59
Information Security Manual
Confidential Page 6 of 59
Information Security Manual
Confidential Page 7 of 59
Information Security Manual
Confidential Page 8 of 59
Information Security Manual
Confidential Page 9 of 59
Information Security Manual
1.0 Introduction
1.1 Purpose
This document describes the Information Security Management System of Pramati Technologies.
Although information security is not a core competency of most organizations, it has become a
key business enabler, and not just an IT option. Without adequately protected network and other
security procedures, the ability of Pramati to carry out its business is not assured. Any Information
Security Risk could cripple the company preventing it from carrying out its normal business for
days and weeks impacting its earnings and profitability. Hence it has become a business
requirement that a stringent Information security management system be put in place.
Pramati Technologies is not a Covered Entity but it is a Business Associate for the Clients
associated in its Health Care Vertical. This HIPAA implementation is to establish criteria and
standards for independent evaluations of the conformance of Processes and Methodologies to all
aspects of HIPAA.
Confidential Page 10 of 59
Information Security Manual
2.0 Scope
Business Functions such as HR, IT support; Finance & Admin-Facilities are part of the scope.
All Employees, fulltime or part time are part of this information security management system.
Facilities listed below are under the scope of this information security management system.
The below facility is covered under scope of HIPAA and treated as Pramati Health Care Vertical:
Confidential Page 11 of 59
Information Security Manual
Confidential Page 12 of 59
Information Security Manual
Confidential Page 13 of 59
Information Security Manual
Word “should”, “may” or “recommended” refers to best practices but not mandatory
Word “User” means employees, partners and contract services who are allowed access to Company
computing and network facilities
The term “third party” refers to vendors, contractors, consultants, customers and other non-employees
who are allowed access to Company computing and network facilities
The words “need-to-know” refer to the security principle that only people who need to know an item of
information to perform their contracted work are authorized to read it
The words “need-to-have” refer to the security principle that only people who need to have an item of
information to perform their contracted work are authorized to work on it
The words “least privilege” refer to the security principle that a person shall be given no privileges other
than those that are required to perform his or her contracted work. For example, if the person requires
an item of information only for reading, he / she shall not be given permissions to modify
Information is an asset which, like other important business assets, has value to an organization and
needs protection. Information assets include program source code, binary programs, documents,
financial statements, correspondence with customers, etc.
The terms information processing asset or information containers refer to assets that store, process or
transmit information. These terms include Information Technology devices like computers, storage
devices, EPBX and communication links etc. They also include other assets like paper, film, people,
buildings used to house people and other information processing assets etc.
Confidential Page 14 of 59
Information Security Manual
We collectively maintain the confidentiality, integrity and availability of sensitive Information in the
company and make them available with minimum disruption to employees when critical to their
function.
We would provide information security awareness and training to employees and non-employees
(as needed) regularly.
All our business units and functions would adhere to configuration management process that
controls access and protects their work products.
We are committed to meet all regulatory, legislative and contractual requirements that our
business demands.
Our business continuity process is planned and implemented to counteract interruptions to critical
business activities from the effects of major failures.
We are committed to report any security breach of information, actual or suspected. All reported
breaches are investigated to initiate corrective actions and be on the lookout for improvement
opportunities.
We intend to do periodic audits to ensure the effectiveness of the implementation of
our information security management system. Our Information Security Forum reviews this policy
annually.
(Jay Pullur)
Founder & Chief Executive Officer
This policy is approved by the CEO. This policy is reviewed and revised by the security forum on a
yearly basis
Confidential Page 15 of 59
Information Security Manual
4.2 Objective
Pramati considers ISMS as a key component in its business operations and growth.
Confidential Page 16 of 59
Information Security Manual
5.0 Leadership
The Leadership team is keen on promoting security of information assets and shall give due
importance to the development and enforcement of a corporate culture, which promotes
information security. Active participation of the user community and staff members is a must for
any security initiative to succeed. The Leadership team shall endeavor to provide regular support
to the staff members and the Information security forum to ensure that the security consciousness
spread across all levels of the organization.
The IS Forum shall ensure employees, vendors and external party users are:
- Aware of security roles and responsibilities and applicable controls
- Security expectations of their role within the organization
- Motivated to fulfill and confirm to security policies of the organization
- Continue to have appropriate skills to manage information security
The IS Forum provides all resources required for the definition and effective implementation of
ISMS. The management participates in the Management Review Meetings and reviews the
effectiveness and suitability of ISMS implementation and suggests taking necessary corrective
actions & facilitates improvement opportunities as required.
Scope
This policy applies to all employees (regular & contract), visiting clients, prospects, vendors,
visitors technicians, house-keeping staff, and catering staff.
Policy
Demonstrating an Identification card (ID card) on person ensures that he /she is an employee
/contractor of Pramati and does not need further checks on one‟s identity. The visitors,
vendors, technicians, house-keeping staff, catering personnel are provided with appropriate
ID cards that would be displayed on person which identifies them at Pramati. Failure to
adhere to this Policy may result in disciplinary action.
Confidential Page 17 of 59
Information Security Manual
Employees are encouraged to ask visitors if assistance is required, direct that person to a
location to obtain assistance. Our efforts should be viewed as presenting a user-friendly
environment where visitors are quickly directed to their destinations, while also alerting
security to people who do not have a specific destination. This will require the cooperation of
all employees since security is everyone's responsibility.
Admin function issue ID cards to all employees with necessary details such as employee
ID, photo, blood group etc.
All employees will wear their ID card at all times in a visible location at or above the waist
while they are in the premises of Pramati.
The visitors, vendors, technicians, house-keeping staff, catering personnel shall display
their respective ID cards at all the times on person in a visible location at or above the
waist while they are in the premises of Pramati.
In the event an employee's ID card is lost or stolen, the employee can sign the register
placed at the reception to gain access into the premises.
ID cards are issued for the exclusive use of the named employee and are not to be
loaned to anyone. ID cards remain the assets of Pramati and must be surrendered upon
demand by HR, or upon termination of employment.
Employees must report lost or stolen ID cards to the Admin function and to their reporting
manager as soon as possible. The employees are charged for each replacement of a lost
or stolen card.
Scope
This policy applies to all employees (regular & contract) at Pramati, including all personnel
affiliated with external parties.
Policy
The use of Pramati‟s automation systems, including computers, fax machines, telephones,
camera, mobile phones, conference systems and all forms of Internet/intranet access, is for
company business and for authorized purposes only. However, the facilities may be used in case
of personal emergencies and other critical times where the situation demands and can be
justified.
Confidential Page 18 of 59
Information Security Manual
- Accessing networks, servers, drives, folders, or files to which the employee has not been
granted access or authorization from someone with the right to make such a grant
- Making unauthorized copies of Company files or other Company data
- Destroying, deleting, erasing, or concealing Company files or other Company data, or
otherwise making such files or data unavailable or inaccessible to the Company or to
other authorized users of Company systems
- Misrepresenting oneself or the Company
- Violating the laws and regulations of India or any other nation or any state, city, province,
or other local jurisdiction in any way
- Engaging in unlawful or malicious activities
- Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other
code or file designed to disrupt, disable, impair, or otherwise harm either the Company's
networks or systems or those of any other individual or entity
- Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in
either public or private messages
- Sending, receiving, or accessing pornographic materials
- Becoming involved in partisan politics
- Causing congestion, disruption, disablement, alteration, or impairment of Company
networks or systems
- Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web
journals, "chat rooms", or private/personal/instant messaging
- Failing to log off any secure, controlled-access computer or other form of electronic data
system to which one is assigned, if one leaves such computer or system unattended
- Using company resources for recreational games
- Defeating or attempting to defeat security restrictions on company systems and
applications.
- Using Company automation systems to access, create, view, transmit, or receive racist,
sexist, threatening, or otherwise objectionable or illegal material, defined as any visual,
textual, or auditory entity, file, or data, is strictly prohibited. Such material violates the
Company‟s Anti-Harassment policies and is subject to disciplinary action.
- The Company's electronic mail system, Internet access, and computer systems must not
be used to harm others or to violate the laws and regulations of India or any other nation
or any state, city, province, or other local jurisdiction in any way. Use of company
resources for illegal activity can lead to disciplinary action, up to and including dismissal
and criminal prosecution. The Company will act as per the prevailing law of the Land and
will comply with reasonable requests from law enforcement and regulatory agencies for
logs, diaries, archives, or files on individual Internet activities, e-mail use, and/or
computer use.
- A posting by employees from a Pramati‟s email address to newsgroups is not permitted
due to the scope for spam and hacking. Where it is necessary, user must seek written
permission from the Chief Information security officer.
- Unless specifically granted in this policy, any non-business use of the Company's
automation systems is expressly forbidden. If these policies are violated, one could be
subject to disciplinary action that may include termination.
Confidential Page 19 of 59
Information Security Manual
Policy
The Company owns the rights to all data and files in any computer, network, or other
information system used in the Company and to all data and files sent or received using
any company system or using the Company's access to any computer network, to the
extent that such rights are not superseded by applicable laws relating to intellectual
property. The Company also reserves the right to monitor electronic mail messages
(including personal/private/instant messaging systems) and their content, as well as any
and all use by employees of the Internet and of computer equipment used to create, view,
or access e-mail and Internet content.
Employees must be aware that the electronic mail messages sent and received using
Company equipment or Company-provided Internet access, including web-based
messaging systems used with such systems or access, are not private and are subject to
viewing, downloading, inspection, release, and archiving by Company authorities at all
times.
The Company has the right to inspect any and all files stored in private areas of the
network or on individual computers or storage media in order to assure compliance with
Company policies and state and central government laws.
No employee may access another employee's computer, computer files, or electronic
mail messages without prior authorization from either the employee or an appropriate
Company official.
The Company uses software in its electronic information systems that allows monitoring
by authorized personnel and that creates and stores copies of any messages, files, or
other information that is entered into, received by, sent, or viewed on such systems.
Accordingly, employees should assume that whatever they do, type, enter, send, receive,
and view on Company electronic information systems is electronically stored and subject
to inspection, monitoring, evaluation, and Company use at any time.
Further, employees who use Company systems and Internet access to send or receive
files or other data that would otherwise be subject to any kind of confidentiality or
disclosure privilege thereby waive whatever right they may have to assert such
confidentiality or privilege from disclosure.
Employees who wish to maintain their right to confidentiality or a disclosure privilege
must send or receive such information using some means other than Company systems
or the company-provided Internet access.
Confidential Page 20 of 59
Information Security Manual
Scope
The scope of this policy includes all personnel who have or are responsible for an account (or any
form of access that supports or requires a password) on any system that resides at any Pramati
facility, has access to the Pramati network, or stores any non- public Pramati information.
Policy
General
All system – level passwords (e.g., root, enable, NT admin, application administration
accounts, etc.) and user-level passwords (e.g., email, web, desktop computer, etc.) Must
be changed once at least every 90 days.
User accounts that have system-level privileged access rights granted through group
memberships or programs must have a unique password from all other accounts held by
that user.
Where SNMP is used, the community strings must be defined as something other than
the standard ones like "public," "private" and "system" or any other default strings and
must be different from the passwords used to log in interactively. A keyed hash must be
used where available (e.g., SNMPv2).
Passwords should never be written down or stored on-line. Passwords must not be
inserted into email messages or other forms of electronic communication.
Password option on all servers shall require them to have a minimum of 8 characters and
their complexity option be enabled
As per current Password policy implemented, password must have a combination of 1
uppercase, 1 lowercase, 1 numeric character and special characters.
According to password policy implemented, password should be changed every 90 days.
All user–level and system–level passwords must conform to the guidelines described.
Guidelines for Construction of Strong Passwords:
- Passwords are at least eight alphanumeric characters long
- They may contain both upper and lower case characters (e.g. a - z, A - Z)
- They may have digits and punctuation characters as well as letters (e.g. 0-9, @#$ %^&*()
_+/ ~-=\‟ {} :”;‟<>? /)
- They shall not have words in any language, slang, dialect, jargon, etc. other than in
English.
- As a best practice, the Passwords should not be based on personal information like
names of family, pet, friends and fantasy characters.
- All passwords /Secret authentication information are to be treated sensitive, confidential
Pramati information. The following precautions are to be taken to protect the passwords
Password Protection Standards
- Don‟t reveal a password to anyone by any means
- Don‟t even hint its format (e. g., “ my family name”)
- Don‟t share a password with family members or near or dear ones
Confidential Page 21 of 59
Information Security Manual
Scope
This policy applies to all Pramati employees, contractors and consultants utilizing Pramati
information assets. Information assets include Correspondence, Corporate papers, computer
media, manuals, drawings etc.
Policy
Confidential Page 22 of 59
Information Security Manual
All “Sensitive” information shall be locked in secured cabinets when not in use. This is to
ensure that confidential or restricted information is not accidentally left unsupervised in
publicly accessible areas such as desks, printers etc.
Documents should not be left unattended at Printers, Xerox, and Fax Machines and
should be collected immediately.
Users should use the facilities provided by IT Support to protect unattended screens by
use of a power on passwords and password-protected screen savers
Staff should ensure their desks are clear every end of the day before leaving, and also
secure confidential information whether physical or electronic, while they are away from
their desk even for a brief period.
5.2.6 Electronic Mail Policy
Purpose
The purpose of this policy is to ensure that the employees use e-mail in a secure manner and the
information transmitted through the email network is secure and its use does not expose the
organization to any risks.
Scope
This policy applies to all Pramati employees, contractors and consultants utilizing Pramati e-mail
accounts and /or other approved email accounts being used in tandem with Pramati business.
Policy
E-mail usage
- Email ID naming convention and signature will be followed as per standards decided by
Information Security Forum.
- No employee shall be permitted to use any other email account for official
communication.
- The users will exercise extreme caution while sending e-mails through the public
networks. Users will be educated during induction on the secure and acceptable use of
the corporate e-mail account.
Remote access to e-mail account
Users shall be able to access their e-mail account from outside the corporate network only after
passing through a designated authentication mechanism.
Usage of internet-based mail accounts
Employees should not use any e-mail account other than the corporate account for official
communications with external users.
Mail Attachment
The attached document may also be protected from unauthorized access by means of a
password depending upon the information like financial data, etc.
25MB is the upload/download limit of email attachments being sent or received. Attachments
larger than 25MB will be automatically uploaded to Google Drive. A Download link will be
included in the emails.
Monitoring
Confidential Page 23 of 59
Information Security Manual
- The organization may, for reasons of security, intercept or otherwise monitor the mails
sent through its mailing system.
- The Function Head of HR can approve monitoring of corporate email of employees.
- Sending unsolicited email messages, including sending of “junk email” or other
advertising material to individuals who did not specifically request such material shall be
considered to be a Spam email.
- Any form of harassment via email, telephone or paging, whether through language,
frequency, or size of messages.
- Unauthorized use or forging, of email header information.
- Solicitation of email for any other email address, other than that of the poster‟s account,
with the intent to harass or to collect replies.
- Creating or forwarding “chain letters”, “Ponzi or other “pyramid “schemes of any type.
- Use of unsolicited email originating from within Pramati networks of other Internet /
Intranet Extranet service providers on behalf of, or to advertise, any service hosted by
Pramati or connoted via Pramati network.
- Posting the same or similar non-business – related messages to large numbers of
Usenet groups (newsgroup Spam).
Scope
This policy applies to all Pramati employees, contractors, vendors and agents with Pramati–
owned or personally–owned computer or workstation used to connect to the Pramati network.
This policy applies to remote access connections used to work on behalf of Pramati, including
reading or sending email and viewing intranet web resources.
Remote access implementation that are covered by this policy include, but are not limited to, dial–
in–modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems and any other similar
mechanisms.
Policy
General
It is the responsibility of Pramati employees, contractors, vendors and agents with remote access
privileges to Pramati corporate network to ensure that their remote access connection is given
appropriate consideration and privileged access rights as they would have had if they were to be
the users-on–site at Pramati.
General access to the Internet for recreational use by immediate household members through the
Pramati Network on personal computers is not permitted. The Pramati employee is responsible to
ensure the family member or the near or dear ones do not violate any Pramati policies, and does
not use the access for outside business interests. The Pramati employee bears responsibility for
the consequences, should the access be misused.
Confidential Page 24 of 59
Information Security Manual
IS policies provide details of protecting information when accessing the corporate network via
remote access methods, and acceptable use of Pramati network
Requirements
At no time should any Pramati employee provide their login or email Passwords to
anyone, not even to family members or near /dear ones.
Pramati employees and contractors with privileged access rights to remote locations
/sites must ensure that their Pramati-owned or personal computer or workstation, which
is remotely connected to Pramati corporate network, is not connected to any other
network at the same time, with the exception of personal networks that are under the
complete control of the user.
Pramati employees and contractors with remote privileged access rights to Pramati
corporate network must not use non–Pramati email accounts (i.e., Hotmail, Yahoo, AOL),
or other external resources to conduct Pramati business, thereby ensuring that official
business is never confused with personal business.
Routers for dedicated ISDN line configured for access to the Pramati network are only on
a case-by-case basis and must meet minimum authentication requirements of CHAP.
Reconfiguration of a home user‟s equipment for the purpose of spilt-tunneling or dual
homing is not permitted at any time.
Non-standard hardware configurations must be approved by IT Support, and IT Support
must approve security configurations for access to hardware.
All hosts that are connected to Pramati internal networks via remote access technologies
must use the most up to-date antivirus software, this includes personal computers.
External connections must comply with requirements as stated in the External Party
Agreement.
Personal equipment that is used to connect Pramati networks must meet the
requirements of Pramati-owned equipment for remote access or should have an explicit
approval from the IT Support function or CISO on any specific deviations.
Organizations or individuals who wish to implement non–standard Remote Access
solutions to the Pramati production network must obtain prior approval from the IT
Support function as well as the Chief Information Security Officer.
Scope
This policy applies to all Pramati employees, contractors and consultants utilizing Pramati
computers or devices that are approved to be explicitly used for Pramati Business.
Policy
The Company has licensed the use of certain commercial software application programs
for business purposes. External parties retain the ownership and distribution rights to
such software. No employee may create, use, or distribute copies of such software that
are not in compliance with the license agreements for the software.
Confidential Page 25 of 59
Information Security Manual
Company provides Employees with all software that is required for performing their job.
For software that is not installed and required for execution of work Employee should get
approvals from system administration before installing.
Employee cannot store/copy/carry any music, videos or any data that is protected by
copyrights or licenses, on the Company system unless such data is required for work to
be done. In such case, Employee needs to take appropriate approvals from the IT
managers.
Any software or licensed or copyrighted content found on Employee system is considered
as responsibility of the Employee and any issues arising thereof would not be the
responsibility of the Company, but would be the responsibility of the employee /contractor
/consultant.
Purpose
This smartphone security policy establishes the rules for the proper use of Pramati/Office
provided smartphone devices for the eligible employees. Also, this establishes to protect the
confidentiality of sensitive data, the integrity of data & applications and the availability of services,
continuity of business.
Scope
This policy applies to all Pramati employees who utilize company-owned, personally-owned, or
publicly-accessible mobile technology to access the organization‟s data and networks via wireless
means. Wireless and mobile access to Pramati network resources is a privilege, not a right.
Consequently, employment at the Company does not automatically guarantee the rights to
wireless and mobile access privileges. This access is governed by and subject to prevailing
Organization‟s policies and guidelines relating to technology, use of data and security restrictions.
Policy
To comply with this policy, it is expected that IT maintains a log and register of all the company
owned smartphones, tablets and other mobile WIFI devices and Gadgets. It also should ensure
that all these devices are updated complying with the respective vendor specifications.
Equally responsible are all such respective employees to maintain and safeguard the devices that
they use or own for work.
The following are the key points to be considered while using the above mentioned gadgets in
Pramati:
- Establish smartphone wireless access security.
- Establish and enforce passwords.
- Vary access levels based on device interrogations.
- Require lost or stolen phones be reported immediately.
- Allow or disallow application use, including Pramati mandated programs for filing reports and
such.
Confidential Page 26 of 59
Information Security Manual
Scope
This policy applies to all the wireless devices in use at Pramati or those who connect through a
wireless device to any Pramati network.
Policy
Confidential Page 27 of 59
Information Security Manual
Whether or not an employee chooses to create or participate in a blog, wiki, online social network
or any other form of online publishing or discussion is his or her own decision. However,
recognizes that emerging online collaboration platforms are fundamentally changing the way
individuals and organizations communicate, and this policy is designed to offer practical guidance
for responsible, constructive communications via social media channels for employees.
Purpose
This Policy has been developed to ensure that Employees of Pramati and Consultants to Pramati
who choose to participate in social media do so in a responsible manner, and act in a way that
protects Pramati interests.
Scope
This policy applies to the use of current & emerging forms of social media including social
networking sites, blogs, micro-blogs, online discussion forum, collaborative spaces, and media
sharing services. This policy is that the Employee may use social media for Personal use only.
And in strict compliance with all other terms of this and other Pramati policies.
Policy
Social Media is defined in this policy as all online or social media includes any sites that allow
a user to contribute content whether that is in the form of article, videos, images, blog entries
or comments on any items including forums or chat rooms. Social media sites include but are
not limited to:
- Facebook
- YouTube
- LinkedIn
- Twitter
- Google+
- Pinterest
- Tagged
- MySpace
Employee, Consultants can participate in social media that is unrelated to Pramati as any
private citizen would, and without need to reference their role at Pramati. They should do so
responsibly, respectfully and in accordance with the rules of any forum in which they
participate. However if an employee or consultants makes reference to Pramati, its people,
Product, Clients, Business partners, Suppliers or other associates on a social media site they
must:
Confidential Page 28 of 59
Information Security Manual
Directors, employees, consultants with Pramati are responsible for all content they publish on
blogs, wikis or any other form of user-generated media and are responsible for:
Ensuring their participation in social media does not breach relevant Pramati polices such as
the System Usage & Security, Release of Information and Code of Conduct.
Ensuring that they do not publish any of Pramati‟s confidential, financial, intellectual, business
performance, sensitive or proprietary information or similar information obtained as a result of
their engagement with Pramati about, our clients, business partners, suppliers or other
associates
Not disparaging Pramati or any of its employees, clients, business partners, suppliers or
other associates, or make any statement which does, or is likely to bring Pramati or any of
these parties into disrepute or ridicule or otherwise affect their reputation.
Being mindful that any published content will probably remain in the public domain for many
years.
Using privacy settings whenever appropriate but remembering that nothing posted on the
internet is ever truly private.
Ensuring that their online activities do not interfere with their job or commitments to their
customers
Breach of this Policy:
Failure to comply with this policy may result in Pramati exercising its rights under a
contractor/consultancy agreement or taking disciplinary action against an employee under the
Disciplinary Process at Information Security Policies. This action may result in termination of
employment and beyond.
The Shredding Policy option instructs employees to securely shred all information which is no
longer needed for business or required by compliance laws – as opposed to directly placing it in a
trash can.
Scope
Confidential Page 29 of 59
Information Security Manual
The Shredding Policy is applicable in the Pramati Premises which includes all Functions (Admin,
HR, Finance, IT Systems) and all Projects work areas, Cabins, Conference rooms and Meeting
rooms.
Policy
Every day, House Keeping personnel under the supervision of House Keeping Supervisor will
pick orphan papers lying at the printers in all floors.
Papers placed for shredding in the bin will be collected/picked-up only. House Keeping personnel
will not pick any papers from “Re-Usable” bin.
Administration Manager or Facility Manager during their rounds shall verify whether the paper
lying at the printers are properly segregated as re-usable or for Shred and appropriately placed in
the bins.
Apart from the above, if there is any element of doubt regarding the papers placed for shredding
papers collected by Housekeeping Boy, Housekeeping Supervisor through his judgment will set
such papers aside and will acquire clarity from Facility Manager or Admin Manager.
Papers which are kept for shredding shall be shredded and disposed off to garbage yard for
further disposal to authorized scrap vendor.
5.2.13 Enforcement
Any employee found to have violated these policies may be subject to disciplinary action, up to
and including termination of employment.
Confidential Page 30 of 59
Information Security Manual
Confidential Page 31 of 59
Information Security Manual
The duties of the Information Security Champ include, but are not limited to the following:
- Oversee and monitor implementation of the components of the HIPAA Compliance plan.
- Develop mechanisms to receive and investigate reports of breaches and monitor
subsequent corrective action.
- Ensuring all the team members are aware of all the implemented HIPAA components,
which are expected of them in order to maintain the policies and procedures.
- Specifying the measures necessary for the Healthcare Vertical in consultation with the
Chief Information Security Officer.
This role – Information Security Champion is extended to other teams with size > 15. The
responsibilities of ISC in non-HCV projects will be same as above in ISO 27001 context.
Confidential Page 32 of 59
Information Security Manual
Steps in for effective communication and coordination in case of security incidents leading to
emergency situations and potential causalities. Ensure safety of human resources and other
infrastructure assets critical to organization‟s business.
System / Project owners are identified risk owners of projects or services or products and are
business owners of specific information assets systems. The context of Delivery lead also
includes a Delivery manager or director.
Ensures physical security aspects of critical assets of organization are covered. Manages facility
related external party services essential for organization‟s business continuity and identified as a
risk owner. The context of facility lead also includes a Facility manager or director.
5.3.9 HR Lead
5.3.10 IT Lead
Ensures that ISMS policies are communicated to interested parties and employees of
organization and provides necessary support to ISMS Team in continual improvement of ISMS.
Ensure that the IT infrastructure is maintained in accordance with the business requirements,
client‟s expectation and ISMS requirements. The IT Lead is identified as a risk owner for IT
related activities. The context of IT lead also includes an IT manager or director.
The internal parties are identified under Security Organization and Responsibilities section
and this includes the employees of Pramati. The intended outcome for the internal parties is
to adhere to the ISMS framework herein laid out in this manual.
The external parties include the clients and suppliers of Pramati. Clients needing data
security may require the Company to fulfill their security requirements.
The Government with statutory requirements will expect the Company to adhere to those
requirements. Suppliers will enter into a non-disclosure agreement and Pramati will do a
review of their services to meet the requirements entered in the Supplier agreement.
Confidential Page 33 of 59
Information Security Manual
6.0 Planning
In cases where the customer has security requirements, which require different/additional
controls from those, indicated in ISMS, the requirements are forwarded to the Chief Information
Security Officer (CISO). CISO in consultation with the function head and Information Security
forum assists the team/function to develop an Information security plan specific to the
function/practice. Again, the risks would be identified and owned by the Function Head.
Confidential Page 34 of 59
Information Security Manual
- Risk Registers
- Risk Assessment and Treatment Plan
- Statement of Applicability
- Applicable Procedures / Processes / Guidelines
- Templates/Formats
- Configuration Management Process
- Document management process
All ISMS documented information are defined, maintained and controlled in accordance with the
Document Management Process.
7.0 Support
7.3 Training
Employees receive appropriate training on the security policy and procedures including security
requirements, business controls and disciplinary action, which may result out of non-compliance.
The trainings will cover appropriate use of IT facilities, security policies and configuration
management, etc. Employees shall be kept aware of any changes to the security policies and
procedures of the organization.
Information Security Training requirements are identified by the Function Heads and Managers
and ISO/Information Security Forum and communicated to the head of HR. Planning and
execution of the training programs is in accordance with the Training Process.
Confidential Page 35 of 59
Information Security Manual
Confidential Page 36 of 59
Information Security Manual
Confidential Page 37 of 59
Information Security Manual
Confidential Page 38 of 59
Information Security Manual
Confidential Page 39 of 59
Information Security Manual
8.2 HR Function
Confidential Page 40 of 59
Information Security Manual
Respective function heads and CISO shall identify training requirements for information security
education/ Information Security implementation awareness
Training Coordinator consolidates the training requests received and prepares a training
calendar. This is reviewed periodically and updated to ensure that the requirements received
subsequently are addressed.
The training requirements are addressed in accordance with the Training process.
Refer to Training process
Confidential Page 41 of 59
Information Security Manual
HR shall communicate relevant employees, customers and vendors of changes to personnel and
operating arrangements
HR shall communicate to the employee responsibilities and duties still valid after termination of
employment.
Refer to HR Process
Confidential Page 42 of 59
Information Security Manual
The indenter shall identify the security requirements by discussing the same with the Network
Administrator and the CISO.
These requirements shall be specified in the purchase order.
Member/s of the Leadership team shall approve material request as well as the purchase order
before the purchase is done.
Information Assets will be accepted only if they meet the criteria specified in the purchase order.
Confidential Page 43 of 59
Information Security Manual
IT Support take backups in accordance with the backup plan and maintains records of backup
taken.
Data that is no longer required on the file servers (e.g. after completion of project, obsolete data)
is archived.
A request for archival is sent to IT Support in writing by the Project Manager/Function Head
indicating the location of the data, names of folders/files to be archived and the duration for which
the data needs to be retained.
IT Support will archive the data using suitable media and handover the same to the
Practice/Function Head.
Media used for backup will be suitably labeled. The date from which the media is being used and
the expiry date beyond which the media can‟t be used will be tracked.
IT Support shall identify the restoration plan for the backups to verify the reliability of the backup
process. The backup data is restored as per the restoration plan and appropriate corrective action
taken in case of discrepancies and also record any improvement opportunities and act upon
them.
Confidential Page 44 of 59
Information Security Manual
Mobile code is software that is transmitted from a remote system to be executed on a local
system, typically without the user‟s explicit instruction. Such malicious code shall be intercepted
by the Antivirus or the monitoring tool for further action.
Although mobile code is typically benign, attackers have learned that malicious mobile code can
be an effective way of attacking systems, as well as a good mechanism for transmitting viruses,
worms, and Trojan horses to users. Workstations. Popular languages for malicious mobile code
include Java, ActiveX, JavaScript, and VBScript. The monitoring tool should detect such a code
and quarantine for further action.
A cookie is a small data file that holds information about the use of a particular Web site. Session
cookies are temporary cookies that are valid only for a single Web site session. Persistent
cookies are stored on a computer indefinitely so that the site can identify the user during
subsequent visits. Unfortunately, persistent cookies also can be misused as spy ware to track a
user‟s Web browsing activities for questionable reasons without the users‟ knowledge or consent.
The monitoring tool should detect such activity and quarantine for further action.
All the web browsers are set to medium or higher security levels where the users will be
prompted before installation of any cookie or script.
8.4.1 Contracts
The organization shall enter into legally binding contracts with all external party service providers.
Maintaining the security of the organization‟s information assets will be a part of the contractual
commitments
External Parties/Vendors who need to have access to organizations information assets for a
longer term are required to sign a Non-Disclosure agreement and have their employees deputed
to the organization screened as per the requirements specified in “Personnel Screening and
Referencing” procedure in this document
Where appropriate, service levels/response time critical for the services are included in the
contracts and shall be monitored
The responsibility for managing the relationship with external party shall be assigned to a
designated individual
Any changes to external party services shall be reviewed and re-assessed for risks before
implementation
Confidential Page 45 of 59
Information Security Manual
Confidential Page 46 of 59
Information Security Manual
Confidential Page 47 of 59
Information Security Manual
Storage location, access rights and handling procedures if any (other than the document and data
control procedure) shall be defined in the Configuration Management Plan of the respective
function holding such documents
Confidential Page 48 of 59
Information Security Manual
HR shall intimate the respective function, Networking and Admin. Functions of new employees
joining details. Details of whether the new employee is a direct employee of Pramati or a contract
employee shall be communicated by the HR explicitly.
IT Support in consultation with the respective function head shall identify the access rights to the
various servers/application systems (includes but not limited to operating system, data base
management system and each application) and provide the same. In case of contract employees
the function head shall identify the differential access rights that need to be provided and
communicate the same to IT Support
Subsequent modifications to access rights are made based on written requests sent by the
respective function head. Where common user Id‟s have to be used for business purposes
appropriate controls such as transaction logging/monitoring shall be enabled.
Where fixed user Id‟s are provided to application systems or servers due to business reasons,
access rights are reviewed and passwords modified before they are reallocated to another
employee.
Whenever an employee leaves the organization, his/her user id and mail account shall be
disabled/deleted/reallocated with immediate effect upon receiving intimation from the Function
Head. Network administrator shall take over the resources after getting a clearance from the
respective Function Head and shall take a backup of the data as instructed.
All requests for user registration/modification/removal shall be logged and tracked using the
Service Request Register
Confidential Page 49 of 59
Information Security Manual
Confidential Page 50 of 59
Information Security Manual
Confidential Page 51 of 59
Information Security Manual
8.5.33 Encryption
Encryption is limited only to Castlight project members.
Encryption of Mac Book‟s Hard disk is performed by IT Team.
Mac's internal encryption tool is used for the same.
Confidential Page 52 of 59
Information Security Manual
Confidential Page 53 of 59
Information Security Manual
Adequate testing will be conducted before implementing any change on the „live‟ system and test
data will be protected against corruption and deletion. All relevant systems documentation will be
updated to reflect changes made to the systems.
The Network Administrator & ISF will ensure that all systems acquired are implemented along
with the required controls identified.
Confidential Page 54 of 59
Information Security Manual
Confidential Page 55 of 59
Information Security Manual
The organization shall ensure that the documents of continuity and recovery plans and backups
of all critical applications and data are available to the staff responsible for implementation of BCP
during a business disruption or a disaster.
Confidential Page 56 of 59
Information Security Manual
The „offsite‟ for such BCP documents will be set up at a location, which can be easily accessed
during any emergency.
A copy of the most critical software, application programs, data, documentation, and other
contingency/disaster records should also be kept off site.
Copies of the continuity/recovery plans, critical documents, records and manuals should be kept
offsite in printed form by the personnel responsible for invocation of continuity plan during a
disruption.
The contract or service level agreement with the external party service providers will include
requirements of business continuity and disaster recovery of the organization‟s data where
feasible.
Refer Business Continuity Plan
Confidential Page 57 of 59
Information Security Manual
Tools, Systems used for conducting Audits shall be protected from unauthorized access
Number of security
incidents which leads to
Incident Report 12 0
loss of business or critical
assets.
Number of causes re-
occurred and resulting in
Audit Report 12 0
non-conformities during
audits
Number of major
Incident Report 12 0
disciplinary actions taken
Number of virus <2 - minor
Incident Report 12
outbreaks 0 - major
Planned Vs. actual
availability of BCP Test Plan 6 - 3 planned for each
100%
infrastructure critical for location
service provision BCP Test Reports
Confidential Page 58 of 59
Information Security Manual
Domain Level
Domain Name Category Description Target Actual
Measurement
# of times
Information Security information security
Security Policy 1
Policy Document policy is reviewed in
a year
Organization of # of management
Internal Organization 1
Information Security reviews in a year
Number of NCs
Business requirements
Access Control found during audit 0
for access control
for access control
Aspects of business
Business Continuity % of BCP Testing
continuity 100%
Management carried out
management
# of times of review
Communications and Third Party Service
of third party 1
Operations Management Delivery Management
services
Number of incidents
Operational procedures System Planning and
due to failure of <=1
and responsibilities Acceptance
capacity planning
Protection against
Number of malware
Protection from malware Malicious and Mobile 0
incidents reported
Code
Failures at device
Infrastructure level leading to loss
Equipment <=1
availability of infrastructure
availability
Number of security
vulnerabilities found
Network Security Security of network
in Vulnerability <=10-12
Management services
Assessment and
Penetration Testing
Confidential Page 59 of 59