Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mention CUI; fix Rolodex; disallow auto-email forwarding #1437

Merged
merged 3 commits into from
Oct 4, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 12 additions & 11 deletions company-policies/security.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Security Policy
version: 1.1.5
version: 1.1.6
---

# CivicActions Information Security Policy
Expand All @@ -26,12 +26,14 @@

You further agree that you will promptly notify your manager if you know of unauthorized use of Confidential Information.

"Confidential Information" means information or material which is proprietary to CivicActions and not generally known outside CivicActions, including information or material that you create, learn, or obtain, as well as information we receive in confidence from third parties. For example, this may include without limitation any information disclosed that is subject to applicable non-disclosure protections of CivicActions privacy policies, non-public product plans of CivicActions or 3rd parties, technical and business information, personnel information like salaries, or other sensitive information. Material need not be marked confidential for it to be considered Confidential Information.
"Confidential Information" means information or material which is proprietary to CivicActions and not generally known outside CivicActions, including information or material that you create, learn, or obtain, as well as information we receive in confidence from our clients and third parties. For example, this may include without limitation any information disclosed that is subject to applicable non-disclosure protections of CivicActions privacy policies, non-public product plans of CivicActions or third parties, technical and business information, personnel information like salaries, or other sensitive information. Material need not be marked confidential for it to be considered Confidential Information.

Check warning on line 29 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L29

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
29:1-29:293     warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability

Check warning on line 29 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L29

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
29:294-29:623   warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability

Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) are confidential by default and may require special handling. We are developing our "CUI Policy" but in the mean time, ask your manager for document policies and disposition rules.

Check warning on line 31 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L31

Unexpected potentially insensitive use of `special`, in somes cases `has a disability`, `person with a disability`, `people with disabilities` may be better special retext-equality
Raw output
31:126-31:133   warning Unexpected potentially insensitive use of `special`, in somes cases `has a disability`, `person with a disability`, `people with disabilities` may be better special     retext-equality

Personally Identifiable Information (PII) should be considered confidential by default, but that may depend upon the project and data usage; PII generally falls into one of two classes:

1. Sensitive Personally Identifiable Information (SPII) - for example: Social Security or Passport numbers, financial account numbers, biometric identifiers, passwords, and all records and files directly relating to a person that are not publicly available.
2. "Rolodex" Personally Identifiable Information (PII) - for example: publicly available personal data such as name, email, home address and phone number.
2. "Rolodex" Personally Identifiable Information (PII) - for example: publicly available personal data such as name, work email, work address and work phone number.

Check warning on line 36 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L36

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
36:5-36:166     warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability

The exact definition of PII varies from jurisdiction to jurisdiction and depends on the project, so consult with your project manager or the security team if you have questions.

Expand All @@ -42,7 +44,7 @@
- Database exports should always be treated as confidential, since these may contain personal information that is not publicly available.
- The uploaded files directory may need to be treated as confidential if the client site has any access-controlled content.
- The site source code can normally be treated as non-confidential, unless this includes proprietary code from the client or 3rd parties.
- The contents of the project management site (e.g. Trac, JIRA, Trello, etc.), e-mail lists and related communication tools, will normally contain a mixture of confidential and non-confidential information:
- The contents of the project management site (e.g. Jira, Mural, etc.), e-mail lists and related communication tools, will normally contain a mixture of confidential and non-confidential information:

Check warning on line 47 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L47

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
47:5-47:202     warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability
- Information authored by clients or 3rd parties should generally be treated as confidential, unless it is clearly public-facing, and then its use other than as set forth in the engagement agreement may still require client permission. If in doubt, ask your supervisor or the legal team.
- Project management material can be sourced for distribution or repurposing, but should be first reviewed and redacted, if needed, to ensure no confidential information remains.

Expand Down Expand Up @@ -71,19 +73,18 @@
- Web-based collaboration accounts such as
- Our home site
- Intranet (internal team collaboration)
- Project management site (Trac, JIRA, Balsamiq, GitLab, ...)
- 3rd party collaboration tools (such as Slack, Trello, Zoom, ...)
- IP telecommunications/conferencing accounts
- Project management site (Jira, GitLab, ...)
- Third party collaboration tools (such as Slack, Mural, Zoom, ...)

Usage of CivicActions user accounts should be as follows:

- Usage must be directly related to your work with CivicActions - personal use (including personal projects) must be approved in advance by the CTO.
- Use in any way harmful to CivicActions or our clients is forbidden.
- Storing confidential personal information from client website users (for example CSV exports from CiviCRM) on internal collaboration systems should be avoided wherever possible, especially on 3rd party services such as Google Docs.
- Confidential information (other than personal information) should only be stored in areas restricted by access control, such as the project management area.
- Binary software executable files should not be distributed via internal collaboration systems, as we do not have anti-virus scanning in place. Uploading human readable source code and scripts (php, bash, perl etc.) is acceptable (but nevertheless should be considered a risk).
- Automatic forwarding of CivicActions email to an outside account (e.g. Slack or a personal gmail.com account) is prohibited.

Check warning on line 83 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L83

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
83:5-83:129     warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability
- Confidential information (other than personal information) should only be stored in areas restricted by access control, such as within a client's VPN or sometimes on a CivicActions Google Share Drive.
- Binary software or executable files should not be distributed internally as we do not have anti-virus scanning in place.

In addition to user accounts we provide developer and system administrator access to system and service accounts, such as administrator web-access and SSH access to client sites, version control systems such as SVN/Git and MySQL database access. Usage of these accounts is covered in the [Engineering Security and Compliance](../practice-areas/engineering/security-compliance.md) guidelines.
In addition to user accounts we provide developer and system administrator access to system and service accounts, such as administrator web-access and SSH access to client sites, version control systems such as Git and MySQL database access. Usage of these accounts is covered in the [Engineering Security and Compliance](../practice-areas/engineering/security-compliance.md) guidelines.

Check warning on line 87 in company-policies/security.md

View workflow job for this annotation

GitHub Actions / remark-lint-suggestions

[remark-lint-suggestions] company-policies/security.md#L87

Unexpected hard to read sentence, according to 5 out of 7 algorithms readability retext-readability
Raw output
87:1-87:242     warning Unexpected hard to read sentence, according to 5 out of 7 algorithms                                                                                         readability retext-readability

## Access Policy

Expand Down
Loading