Clear Desk and Clear Screen Policy in ISO 27001

Categories

Latest Post

Have Any Question?

Got a question? We’re here to help!

Facebook
Twitter
LinkedIn
Pinterest

Imagine this scene: an employee at his desk in an open-plan office is reviewing financial data on his notebook. He receives a call about a last-minute meeting or takes a break for coffee, leaving his desk unattended.

This situation is more common than you might think and poses a significant information risk. Without proper measures, all the information and assets left on the desk can be accessed, seen, or taken by unauthorized individuals. If an information system is left logged on, anyone who accesses the desk can perform activities in the employee’s name.

ISO 27001, a popular information security framework, and ISO 27002, a detailed code of practice, provide guidance on handling such risks through control A.7.7 – Clear Desk and Clear Screen. Let’s explore how to implement these best practices.

ISO 27001 Clear Desk and Clear Screen – Best Practices

  • Use of Locked Areas

  • Protection of Devices and Information Systems

  • Restriction on Use of Copy and Printing Technology

  • Adoption of a Paperless Culture

  • Disposal of Information in Meeting Rooms

What Are Clear Desk and Clear Screen All About?

Clear desk and clear screen practices ensure that sensitive information, both digital and physical, and assets (e.g., notebooks, cellphones, tablets, information systems) are not left unprotected at workspaces when not in use or when someone leaves their workstation.

Why Are Clear Desk and Clear Screen Policies Important?

These policies guide employees on how to handle information and assets properly. They provide guidelines on securing information and materials in the workspace.

What Does a Clear Desk and Clear Screen Policy Require?

Compliance with ISO 27001 Control A.7.7 involves simple, low-tech actions:

  • Lock away assets when not required.

  • Log off or use screen locks for computers and terminals when unattended.

  • Use photocopiers and similar devices only when authorized.

  • Remove media from printers immediately.

How to Implement a Clear Desk and Clear Screen Policy

Use of Locked Areas

Provide lockable drawers, cabinets, safes, and file rooms to store information media (e.g., paper documents, USB drives) and easily transportable devices (e.g., cellphones, tablets) when not required.

Protection of Devices and Information Systems

Position computers to avoid passersby viewing screens. Use time-activated screen savers and password protection. Log off information systems when not in use. Shut down devices at the end of the day, especially network-connected ones.

Restriction on Use of Copy and Printing Technology

Control the use of printers, photocopiers, scanners, and cameras by reducing their quantity or using code functions for authorized access. Retrieve printed information promptly.

Adoption of a Paperless Culture

Avoid unnecessary printing. Do not leave sticky notes on monitors or under keyboards. Even small pieces of information can help wrongdoers compromise security.

Disposal of Information in Meeting Rooms

Erase whiteboards and properly dispose of papers used during meetings (e.g., use a shredder).

Periodic Measures

  • Training and Awareness: Conduct regular training and awareness events. Use posters, email alerts, newsletters, etc., to communicate policy aspects.

  • Evaluations: Periodically evaluate employees’ compliance with policy practices through internal audits or random workstation checks.

What is a Clean Desk Audit?

A clean desk audit systematically evaluates if planned rules and measures are implemented and followed by employees.

Avoid Prying Eyes and Unauthorized Access

A lack of care with workspaces can lead to compromised personal or organizational information. Passwords, financial data, and sensitive emails can be disclosed, impacting privacy and competitive advantage. Negative outcomes due to accidents, human error, or malicious actions can be prevented through accessible low-tech measures in a clear desk and clear screen policy.

Don’t wait for incidents to occur. Implement preventive measures now to protect your sensitive information.