Our Partners close more business.
Use these powerful resources to win more business, faster, with less effort.
Call 877-411-2220 x121 for personal support with any opportunity.
RESET SEARCH
Hosting Quote Estimator
GET a FREE Sandbox or Trial Environment NOW
How To Use This Tool:
To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc. You will find common questions and answers grouped together in one record. Follow the tag links to refine your search. Supporting downloads and documentation are available, below.
Please login to obtain download access to additional supporting documentation. Registered users can also contribute to the database. You can request access by Contacting Us.
Supporting Documents
Please note that assets with generic thumbnail require login for access. If you require access please Contact Us.
© Omegabit LLC, 2023
Enter a Search Phrase or Select a Tag
Content with tag mobile .
Information Security - Wireless
Q:
Do you have an established usage restrictions and implementation guidance for wireless access?
Does wireless access require authorization before connection?
Are wireless connections encrypted using WPA2 or higher?
Do you monitor and restrict connection and use of unauthorized mobile devices, writable, removable media in information systems?
Do you employ full-device encryption or container encryption to protect the confidentiality and integrity of the client information on mobile devices?
Wireless Policy
A:
Ref: Omegabit Employee Handbook, Guidelines and Operations Wiki procedures.
Yes.
Any secure communications are further tunneled and wrapped in either IPSec or SSH depending on the nature of connection. All wifi connections including LAN Wifi are hardened similarly as with public or unprotected network links.
Yes.
IPSec, SSL, SSH (256-bit)
Wireless Policy: This is documented in Part III, Section 6. Wireless Communication Standard, IT Security Handbook.
Mobile Code
Q:
Do you have a policy in place for the use of mobile code and mobile code technologies? Mobile code technologies can include, for example, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and Virtual Basic Script.
A:
Team members are educated on the risks of these technologies and they are prohibited when handling or communicating sensitive information. However, they are commonly used in Liferay implemenetations and are allowed for the purposes of diagnostics and support. Flash, in particular, is prohibited exect where reuqired to perform ciritical job funcstions with trusted affilates and services.
Personnel & Contractors - Security Policies
Q:
Do you have Mobile Device / BYOD / MDM Document?
Do you have Workstation Security Document?
Do you have Acceptable Use Policy?
Do you have Access Control Policy?
Do you have Remote User Policy?
Do you have a Password Policy?
Do you have an Encryption Policy?
Do you provide Personnel Security Training?
Do you have documented personnel security policy and procedures?
Do you have a Clean Desk Policy?
Are system support personnel trained on security responsibilities based on their role?
A:
This is documented in Omegabit Employee Handbook, Section 6. Rules of Conduct
This is documented in Part 2, Section 1, Workstation Security Policy, IT Security Handbook
This is documented in Part I, Section I, Acceptable Use Policy, IT Security Handbook
This is documented in Part 3, Section 3, Remote Access Policy and Part 3, Section 2, Bluetooth Baseline Requirements
This is documented in Part III, Section 3. Remote Access Policy, IT security Handbook
This is documented in Part 1, Section 8, Password Construction Guidelines, IT security Handbook
This is documented in Part 1, Section 5, Acceptable Encryption Policy, IT security Handbook
Personnel Security is covered as a component of onboarding and training as it relates to work environment and surroundings. And, is also a notable component of info security training as it relates to the an individual's perceived value or risk as it relates to access to information.
ref: Omegabit Employee Handbook
This is documented in Part I, Section 2. Clean Desk Policy, IT Security Handbook
Yes