ADHICS Implementation Guidelines PDF
ADHICS Implementation Guidelines PDF
[ADHICS]
December 2019
Page 2 of 192
Introduction
The Department of Health (DOH) has established the Abu Dhabi Healthcare Information and
Cyber Security (ADHICS) Standard as a strategic initiative in support of DOH’s vision and
Federal/National mandates, endorsed by DOH’s Executive Committee. The provisions of this
Standard are harmonized with international healthcare industry standards for Information
Security.
The adoption of ADHICS Standard by DOH licensed healthcare entities will prepare and enable
Abu Dhabi’s Health Sector to uphold privacy and security. Its implementation complements the
Government’s initiatives towards Health Information Exchange (HIE), enhancing security and
public trust.
Legal Background
The Federal Law No. (2) for the year 2019 on the use of Information and Communications
Technology (ICT) in Healthcare mandates security and safety of health information while also
specifying hefty penalties for non-conformance. Implementing the ADHICS standard will
significantly improve the entity information security risk profile but does not exclude the entity
from any legal liabilities.
Also, the Telecommunications Regulatory Authority (TRA) National Cybersecurity Strategy has
identified the Healthcare Sector as one of the nine critical sectors of the UAE. The National
Cybersecurity Strategy envisages identifying critical assets, establishing risk management
standards and a robust process for reporting, compliance and incident response. The DOH
Cybersecurity strategy complements the National Cybersecurity Strategy, adapting it to the Abu
Dhabi Healthcare sector.
This document aims to provide a common set of guidelines to help DOH-licensed healthcare
entities in the development, implementation, establishment and maintenance of Information
Security Management System (ISMS) Program required for the health and other information
under their control.
Page 3 of 192
There is widespread awareness about Cybersecurity incidents due to coverage in news media.
However, awareness about the root causes as well as the full implications of these incidents is
low. It is only a matter of time before every entity faces an information security threat. How to
minimize the impact and minimize the recovery times is critical for healthcare entities to
maintain their service levels as well as legal and regulatory commitments.
As healthcare information becomes digitalized and healthcare equipment more and more
‘connected’, the risks are exponentially rising.
Healthcare delivery is often time critical. Unstructured information security controls can add
delays to healthcare delivery. The Standard’s holistic approach covers the whole organization,
not just IT, and encompasses people, processes and technology across the lifecycle of health
information. This enables employees to readily understand risks and embrace security controls
as part of their everyday working practices without introducing significant delays.
There are new and disruptive digital innovations in the healthcare industry on a regular basis.
The implementation of the standard will create an environment that can add new technologies
and techniques in a controlled way without significantly adding to the entity risk environment.
Having information security as a criterion in all phases like selection, procurement, contract,
implementation and maintenance will minimize the risk and the need for workarounds later.
This guideline interprets “how” the elements mentioned in the ADHICS Standard can be
implemented. Therefore, its focus is primarily on the domains, controls and sub-controls of
Section B of the ADHICS Standard. For ease of use, the numbering system of Section 4 of this
guideline matches Section B of the Standard. Entities that have already implemented other
standards, such as ISO 27001, are already compliant with a majority of the ADHICS control
requirements. However, particular attention will have to be paid to healthcare specific
variations mandated by ADHICS.
Note that this document is only an implementation guideline and does not override ADHICS or
any other regulatory documents issued by the Department of Health or other government
entities. In case of contradiction, please refer to the documents concerned and follow them.
The content of the standard and this guideline, while comprehensive, is not exhaustive. It is the
healthcare entities’ management responsibility to provide and maintain healthcare information
security. Compliance to the ADHICS standard without due consideration of the actual business
environment may not protect the information’s confidentiality, integrity and availability.
Page 4 of 192
Scope
The guidelines are applicable to all types and sizes of entities that are mandated to be
compliant with ADHICS as per the timelines defined by DoH.
The ADHICS standard applies to any/all Information Technology systems and applications fully
owned by the DOH licensed healthcare entities, as well as the entities’ access and usage of
partners’ and third party systems, and Information Technology applications utilized within Abu
Dhabi Healthcare ecosystem. This includes the Shafafiya portal, Malaffi, the Health Information
Exchange platform, DoH e-Services, Medical Tourism portal, etc. With respect to health
information, the ADHICS standard is applicable to all forms of information, physical or digital.
Please see Section A-2.1 of the standard for details.
Partnership
The National Cybersecurity Strategy envisages a partnership across Government, Public and
Private sectors to achieve excellence in cybersecurity.
The ADHICS Standard is intended to build a healthcare entity’s capability to secure its
information assets, continue functioning and delivering its healthcare activities without
interruption. At the same time, the Department of Health is building and enhancing its
cybersecurity capabilities to complement the efforts of Abu Dhabi healthcare entities. These
efforts include a 24/7 Security Operations Center (SOC) to support cyber incident management
across the Abu Dhabi healthcare sector in addition to its core information security activities for
the DOH.
Additionally, a comprehensive set of partnership initiatives are also being developed by the
Department of Health to contain and limit exposure to information security threats across the
healthcare sector. These include Awareness E-Learning, Security Advisories, Newsletters, Cyber
Threat Intelligence (Brand & Digital Asset Monitoring), Forensic Assessment, Vulnerability &
Technical Assessment, and a Threat Intelligence Platform providing actionable threat
intelligence feeds to entities, specific to their deployed assets. This will leverage the
Page 5 of 192
investments, resources and technologies of the Department of Health to reduce the risk
exposure across the Abu Dhabi Healthcare sector. These initiatives have been branded as the
Abu Dhabi Healthcare CERT.
More Information:
For more information on or support from Abu Dhabi Healthcare CERT, please contact (24/7):
[email protected]
+971 2 4193 777
For more information and support on the Abu Dhabi Healthcare Information and Cyber
Security (ADHICS) Standard, please contact:
[email protected]
Page 6 of 192
Section 1
This section is the starting point to the Guidelines listing the different steps needed for
implementation to be followed in the same order. Each step is covered in details in
subsequent sections.
Page 7 of 192
The standard is available for free download from
Step 1 Obtain a copy of the standard Department of Health website
(doh.gov.ae > Resources > Standards)
Step 2 Know your Entity license type Pharmacy, Clinic, Centre, Hospital etc.
Page 8 of 192
Section 2 – Mandatory Requirements
This section provides guidelines for the implementation of the mandatory requirements
defined in Section A of the ADHICS Standard.
Page 9 of 192
Governance
All DOH regulated healthcare entities must implement the three-layer ADHICS Governance
pyramid structure specified in Section A-3 of the Standard.
This is to assign ADHICS implementation roles and responsibilities and ensure separation of
duties. The three layers correspond to the entity management (ISGC), information security
management (HIIP) and the implementation team (ISG). Please refer to the standard for details
of the roles. Existing entity committees can also fulfill these roles where suitable.
The Implementation stakeholders group can have third party staff. However, the other two
groups should comprise of entity or parent entity staff. The committees of the ADHICS
Governance pyramid in the standard can be scaled down to match smaller entities provided the
three roles are defined. The memberships of the three groups as well as their meetings should
be documented for audit purposes.
The HIIP Workgroup will be the interface between the entity and the Abu Dhabi Health Sector
HIIP Workgroup of the DOH as well as between the entity management and implementation
teams.
Within the ADHICS Governance pyramid, this guideline is primarily intended for the use of the
HIIP workgroup and Implementation Stakeholders group and should always be referred to in
combination with the corresponding parts of the ADHICS standard.
Page 10 of 192
Risk Management
Risk Management including assessment and mitigation requirements of ADHICS are covered in
Section A-4 of the Standard. An entity’s risk assessment process should treat health information
security as a major risk taking into account health information privacy as well as availability of
health information. Entities without an existing risk register can use an up to date asset register
and the controls of Section B of the ADHICS standard to develop the entity risk register.
Risk assessment can guide a healthcare entity in determining the level of effort and resources
needed to protect confidentiality, integrity and availability. The results of regular risk
assessment must be aligned with the implementing entity’s priorities, initiatives and
investments..
The development and application of Information Security policies and procedures, additional or
as required by the ADHICS Standard is the responsibility of the implementing healthcare entity.
To facilitate the policy development process for entities, sample Baseline Policies are provided
in Section 3 of this document. Entities are free to customize the provided baseline policies as
per their environment as long as they remain compliant with the requirements of the ADHICS
Standard and any other DOH or legal requirements.
Asset Classification
Section A-5 of the ADHICS Standard defines the asset classification scheme to be used within
the entity. Asset management policy and processes are covered in Domain 2 – Asset
Management of Section B. Controls AM 1 to AM 3 and associated sub-controls cover asset
classification. Guidelines are available under the corresponding parts of this document.
Information assets includes information/data in all its form, as well as the underlying
application, technology, and physical infrastructure to support its processing, storing,
communicating and sharing. The following are considered information assets:
• Information (in physical and digital forms)
• Medical device and equipment
• Applications and Software
• Information System
Page 11 of 192
• Physical Infrastructure (Data centre, access barriers, electrical facilities, HVAC systems, etc)
• Human resources (in support of care delivery)
Page 12 of 192
Section 3 – Baseline Policies
This section consists of templates for the basic information security policies required for the
effective implementation of the identified and applicable controls within a healthcare entity.
They can be used by the healthcare entity as is by just replacing the square brackets [ ] with
the correct names as applicable to the specific entity. Alternatively, the healthcare entity can
customize them to suit its purposes taking into account inclusion of all required information.
Or, the healthcare entity may use its own policies if already in place. The term ‘Users’ means
all employees, third parties and vendors who access the entity information in any form.
Page 13 of 192
Index
Page 14 of 192
Information Security High Level Policy
Objectives
The objective of this Policy is to outline the basic principles of protecting all the information assets of [Entity
Name], and make all Users within the Entity aware of the potential security threats and associated business risks.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The [Director General or job title assigned with responsibilities of Entity’s higher management] of [Entity
Name] shall endorse this policy for its effective implementation.
Policy in Detail
Policy Statement
[Entity Name] is committed towards securing the Confidentiality, Integrity and Availability of information for the
day to day business operations. The security of information and other assets is therefore regarded as fundamental
for the successful business operation of [Entity Name].
This high-level information security policy is a key component of [Entity Name]’s overall information security
management framework and should be considered along with [Entity Name]’s specific and more detailed
information security policies, procedures, standards & guidelines.
Adherence to this policy will help to protect data/ information of [Entity Name] and its customers from
information security threats, whether internal or external, deliberate or accidental.
It is recognized that detailed policies and procedures will be required and [Entity Name] is committed to
implementing these in full.
Page 15 of 192
Core Principles
[Entity Name] recognizes that secure operations are dependent upon securing three core organizational elements,
which are people, process and technology. Thus, all [Entity Name] activities must adhere to the general principles
laid down. Where appropriate these principles are elaborated below to provide the basis by which [Entity Name]
security will shape the direction and conduct of security:
1. Maintain the confidentiality, integrity & availability of Information & Information assets.
2. Meet the UAE regulatory, statutory and legislative requirements.
3. Report and investigate all suspected breaches of Information Security.
4. Provide appropriate Information Security Training & awareness to all employees (permanent & contract
employees).
5. Design appropriate controls and procedures to support the implementation of this Information Security
Policy.
6. Ensure all stakeholders are responsible for implementation of respective security policies & procedures
within their area of operation, and oversee adherence by their team members.
7. Continually improve Information Security through implementation of corrective and preventive actions.
8. Prepare, maintain and test Business Continuity Plans in a practical manner based on the business needs.
9. Annually review this Policy for adequacy and appropriateness.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 16 of 192
Human Resource Security Policy
Objectives
To ensure right resources are hired and utilized to support secure delivery of organizational objectives and
services, and are relieved in a manner that does not impact organizational assets, value, reputation and financial
conditions any time current or in future.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The [HR section/department or the function assigned with HR responsibilities] of [Entity Name] is responsible
to implement the defined security controls and ensure compliance with this policy.
Policy in Detail
Note: Human resources management shall be in compliance with [Relevant HR Law] and its amendments, or any
other regulations the Entity follows in this context.
Screening
1. The [Manager of Human Resources or the job title assigned with responsibilities of managing human
resources] shall ensure the following primary checks as part of the screening process:
Verification of personal data such as date of birth.
Verification of relevant educational and professional qualifications.
Verification of previous employment data.
An assessment of background, by seeking criminal records verifications through the official sources.
Page 17 of 192
Legal and Contractual Requirements
1. The [HR section/department or the function assigned with HR responsibilities] shall ensure that as part of
contractual obligation, employees shall agree and sign the terms and conditions of an employment contract.
2. The [HR section/department or the function assigned with HR responsibilities] shall ensure that the terms
and conditions of employment contract include statements relevant to information security such as (but not
limited to):
Performance of daily activities in compliance with the Information security and all other relevant policies,
procedures and standards.
Extended responsibilities beyond the department premises, outside normal working hours and after
employment tenure.
3. The [HR section/department or the function assigned with HR responsibilities] shall ensure that all
employees are aware and have acknowledged on the non-disclosure clauses included in their employment
contract which extends beyond the employment with [Entity Name] and are aware & have read the
information security policies of [Entity Name].
Disciplinary Process
Page 18 of 192
1. The [Manager of Human Resources or the job title assigned with responsibilities of managing human
resources] in coordination with [Information Security Manager or the job title assigned with responsibilities
of managing information security] shall ensure that non-compliance with the information security policies,
procedures and standards are investigated and disciplinary measures are enforced.
2. All employees who indulge in misconduct or a security breach shall be subjected to the HR disciplinary process
after verification and collection of evidence.
3. Any serious misconduct or significant violation of Information security policies shall be referred to the Entity
Disciplinary Committee for further action.
4. The formal disciplinary actions shall be decided considering the following factors:
Nature and gravity of the breach
Its impact on business
Whether it’s a first or repeat offence
Whether the violator was properly made aware and trained
Relevant legislation
Employment contract etc.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 19 of 192
Information Assets Management Policy
Objectives
The regulatory structure surrounding nearly every facet of the healthcare operations, from protecting patient data
and improving health outcomes, to reporting on compliance-related issues, necessitates healthcare entities to
monitor and record the use of information assets.
Information assets includes information/data in all its form, as well as the underlying application, technology, and
physical infrastructure to support its processing, storing, communicating and sharing. The following are considered
information assets:
• Information (in physical and digital forms)
• Medical device and equipment
• Applications and Software
• Information System
• Physical Infrastructure (Data centre, access barrios, electrical facilities, HVAC systems, etc.)
• Human resources (in support of care delivery)
Scope
This policy applies to all Users of [Entity Name]. The scope includes all information assets owned and managed by
[Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. All information assets owners are responsible for ensuring that this policy is applied within their
area of their responsibility.
Page 20 of 192
Policy in Detail
Information Assets Management
1. All information assets shall be identified, recorded and maintained through an information asset inventory.
2. The asset inventory shall be reviewed and updated on regular basis and as and when there is any major
organizational restructure.
3. All information assets shall have the following defined & documented:
Owner/Author of information.
Custodian of information.
Page 21 of 192
configurations or vulnerabilities exploitable advantage, strategic registers, financial details in
by those with malicious intent. operational plans, relation to projects or
Information that the Entity, or through government relations, proposals, strategic/critical
government or regulatory mandates, has a legal binding. projects RFPs, Information
duty of care to others to hold in safe custody Security Incident Reports etc.
(e.g. critical personal information,
health/healthcare information, government
information, financial information etc.).
Restricted Information that must be afforded limited Disclosure of such External Government
confidentiality protection due to its use in the information with Correspondences, Policies,
day-to-day operations. Disclosure of such unauthorized individuals Procedures, Standard
information could have limited adverse could result in Operating Procedures,
impact on the functioning or reputation of undesirable effect or Internal Circulars, contract of
the Entity or the government/health sector. minimal impact on non-critical projects, projects
Information that relates to the internal [Entity Name] financial, charters, etc.
functioning of the Entity and will not have operational or
general relevance and applicability to a wider reputation status.
audience. Although individual items of
information are not sensitive, taken in
aggregate they may reveal more information
than is necessary, if they were to be revealed.
Public Information destined to be used in public No impact Website information, news
domain or public use, and has no legal, articles, marketing
regulatory or organizational restrictions for its disseminations, etc.
access and/or usage.
Intended purpose from the creation, access
and use of the information is the general
advancement of society, promotion of the
interest of the organization and of the
country, providing essential information
equipping citizens, patients and other
stakeholders understand better the
country’s/governmental/organizational vision
and values.
1. Sharing of Information classified as Secret and Confidential with third parties or any other [Entity Name]
employees shall be based upon obtaining proper authorization as defined previously and applying strict
controls such as signing NDA.
2. Any information where the classification is not obviously clear or not done shall be treated as Confidential
irrespective of the content or the data it carries.
Page 22 of 192
Asset Labeling
Public
Restricted
Confidential
Secret
Page 23 of 192
2. Appropriate controls shall be in place to ensure security of the information during its transmission over
different channels such as LAN, WAN, Internet or physical delivery. The level of controls shall be in line with
the classification category of assets being transmitted.
3. The recipient of the information shall treat it in accordance with the information asset classification
established by its originator.
4. The information asset owner shall consider proper transmission controls for the information assets
transmission requirements.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 24 of 192
Physical & Environmental Security Policy
Objectives
To ensure that information assets receive adequate physical and environmental protection, and to prevent or
reduce probabilities of physical and environmental control/security compromises (loss, damage, theft,
interference, etc.)
The following aspects of physical and environmental security shall be considered;
Physical protection of data center and information processing equipment(s)/facilities
Physical entry control for secure areas
Medical devices/equipment(s) protection
Heating, ventilation, and air conditioning of critical areas and work places
Supporting mechanical and electrical equipment’s
Surveillance of critical areas and work places
Security and protection of physical archives
Fire and environmental protection
Visitor management
Scope
This policy applies to all Users of [Entity Name], and covers all types of information and information processing
facilities of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Page 25 of 192
6. The [Unit/Department assigned with responsibilities of physical building security] shall be responsible of
ensuring that maintenance and testing of fire detection and suppression systems is carried out on a periodic
basis, and that records and reports of such testing are maintained.
Policy in Detail
Physical Access Provisioning & De-Provisioning
1. Access to [Entity Name]’s premises will be granted as per the procedure of physical access of the Entity (to be
developed by the Entity based on the business needs).
2. Visitors’ access, including third party vendors, to [Entity Name] premises will be granted on case by case basis
as per the Entity procedures.
3. De-Provisioning of physical access is valid under the following circumstances:
End of employee’s service
Vendors/Contractors completing their engagement or as per the expiration of the temporary gate
pass.
If requested by the Director of the department which the user belongs to.
If user found to have violated the policy or misused the provided access in any mean.
Identification Cards
1. All employees shall wear the employee ID card issued by the [HR section/department or the function
assigned with HR responsibilities] while they are inside the premises of [Entity Name].
2. All non-employees (contractors, consultants, suppliers, vendors, partners, etc.) shall wear respective
identification cards while they are within the premises of [Entity Name].
3. The ID cards shall be placed in a manner that is clearly visible.
4. All new employees shall be primarily issued with temporary ID cards, till they are issued with their ID cards.
5. All Users shall return their ID card in the event of resignation, termination, transfer or retirement to [HR
section/department or the function assigned with HR responsibilities].
6. All employees are authorized to politely challenge individuals who don’t have ID cards while they are within
the premises of [Entity Name].
Page 26 of 192
5. All areas that contain critical information and information processing facilities shall be fitted with strong
physical access control mechanisms.
6. Physical access shall be deactivated or revoked for terminated Users.
7. Physical access rights of all Users shall be reviewed on a periodic basis (minimum once every six months) by
the [Information Security Section/Department or the function assigned with information security
responsibilities] in coordination with respective managers / directors responsible of critical information and
information processing facilities in order to check if there are access rights that are no longer needed.
8. The names and designations of Users who have the right to authorize others to have access to areas that
contain critical information or critical information processing facilities shall be maintained by the [Information
Security Section/Department or the function assigned with information security responsibilities] in
coordination with the respective managers / directors.
9. Users shall keep their cabinets/drawers locked when leaving the offices at the end of the day.
Page 27 of 192
2. Information assets that are sent out for maintenance or repair shall be recorded by the respective section
manager.
3. Retirement of information assets shall be authorized by the respective section manager and approved by the
[Corporate support Department or the function assigned with assets management].
Environmental Security
1. Temperature, humidity and flooding sensors shall be installed and monitored regularly at the Datacenter
hosting critical servers, medical devices and networking devices.
2. Appropriate safeguards against environmental and other external threats must be applied to all premises,
including but not limited to, data center and office space, to protect employees, sensitive information and
other assets.
Cable Security
1. Adequate planning and designing shall be carried out before installation of new or changes to existing
communication / networking connectivity within the premises.
2. All electrical installations shall be properly insulated; loose ends cables shall not be connected to live electrical
systems.
3. Communication and Network cabling shall follow the standard norms and shall have similar cabling
precautions as mentioned in electric cables.
4. Proper earthing shall be carried out throughout the [Entity Name] premises.
5. Communication and network equipment, cables shall be installed in places with minimum Electromagnetic
Interference and shall be properly insulated.
6. All kinds of cables shall be laid under the ground/floors or enclosed with proper shields or enclosures.
7. Network equipment shall be positioned in permanent locations away from easy reach. Cabling from Network
equipment to systems shall be through concealed channels.
8. Network Termination points shall be installed in permanent fixtures.
Protection of Equipment
Page 28 of 192
1. The environmental condition of information processing facilities shall be maintained in accordance to the
manufacturer recommendations.
2. The assets owners of the information processing facilities shall carry periodic maintenance of the equipment
to ensure continuous operational conditions and prevent damage from dust and pollution.
3. The critical equipment purchases shall be supported with adequate vendor support and defined service level
agreements.
Incident Reporting
1. All incidents related to the physical and environmental security shall be reported to [Information Security
Section/Department or the function assigned with information security responsibilities] as per the Entity
Information Security Incident Management procedures (that is to be developed by the Entity based on the
need).
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 29 of 192
Access Control Policy
Objectives
To ensure access to information and information systems are controlled, and to minimize probabilities of
information leakage, tampering, loss and system compromises.
Scope
This policy applies to all Users of [Entity Name] who use or require Logical Access to information processing
facilities as part of their day to day activities.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The [Information Security Section/Department or the function assigned with information security
responsibilities] shall maintain a list of Users having primary responsibility for information
assets/systems/application and the information assets to which their authority extends.
7. [System Administrators or the job title assigned with responsibilities of systems administration] are
responsible to implement the defined security controls on the respective information systems.
Policy in Detail
User Access Provisioning
1. All formal procedure shall be in place for user registration & de-registration.
2. All access privileges shall be allocated on a “need basis” – only the minimum privileges required for the user’s
functional role shall be allocated.
3. User access provisioning should be initiated in the following cases, but not limited to:
New employment
Users being promoted/demoted/transferred
Page 30 of 192
Temporary assignment of job responsibilities
Access to external Users (such as vendors, contractors and partners) & third parties, etc.
4. All high privilege access shall be provided only after approval [Information Security Manager or the job title
assigned with responsibilities of managing information security] and [Assigned person from Top
Management].
5. Any information systems’ service account or generic account shall be created with approval from the
Information System Owner, Business Processes Owner & shall have an owner assigned to ensure
accountability.
6. The list of service accounts or generic accounts shall be identified & documented by respective systems
administrators.
4. The [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions
and sections] shall be responsible of ensuring access revocation of the resigned or terminated user from all
information processing facilities which the user had during the tenure of employment with [Entity Name].
5. The [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions
and sections] shall be responsible of verifying and signing the access termination of the resigned or
terminated user.
6. On completion of revocation of access, the [Information Security Manager or the job title assigned with
responsibilities of managing information security] shall review and endorse the access termination evidences.
Page 31 of 192
2. Users shall be provided with one ID per system or application with the appropriate privileges mapped to carry
out their day to day activities.
3. [System Administrators or the job title assigned with responsibilities of systems administration] shall assign
unique user identification to the authorized user upon notification of access request approval.
Review of Access
1. The [System Administrators or the job title assigned with responsibilities of systems administration] shall
generate Users list from the Information Systems on a regular basis, at least twice a year. This list shall be
reviewed by Business Owner and the directors/managers of the users, to identify redundant, dormant, or
expired user accounts, or incorrect privileges.
2. User accounts that are inactive for a period of <<maximum 90 days>> shall be disabled by [System
Administrators or the job title assigned with responsibilities of systems administration] on a regular basis.
3. All privileged and administrators accounts shall be reviewed on a quarterly basis, and changes to such
accounts shall be logged for periodic review.
Network Security
1. Provisioning or de-provisioning of access to [Entity Name] network & its services shall be carried out in
accordance with the Access Control Policy and User access management procedures (to be developed by the
Entity based on the business needs).
2. [Network Administrators or the job title assigned with responsibilities of Network Management] shall
ensure that only authorized Users are able to access network resources.
3. Unwanted ports and services, configured on any network equipment, shall be disabled or removed.
4. For shared networks, especially those extending across [Entity Name]’s boundaries, strict access control shall
be implemented to restrict unauthorized access as per business requirements.
5. The configurations of all network and security devices shall be backed up as per the Entity Information-Data
Backup Policy.
Page 32 of 192
6. The default passwords of network and security devices shall be changed by the [Network Administrators or
the job title assigned with responsibilities of Network Management] immediately after installation.
7. All Passwords of network or security devices shall comply with the Entity Password Policy.
8. Network and security devices placed on all external network connections, shall display banner message
warning unauthorized Users that unauthorized use is prohibited (e.g. If you are NOT authorized to access this
equipment, Please log out immediately).
9. All network and security devices shall be protected against physical and environmental threats in accordance
with the Entity physical and environmental security policy.
10. Failover mechanism shall be deployed when setting up all network devices, to avoid single point of failure that
could cause the unavailability of the network services.
11. Segregation, in the form of multiple DMZ’s, shall be implemented when publishing public facing services.
12. Change management procedure and proper authorization shall be followed prior to modifying configurations
of any network and security device.
13. [Network Administrators or the job title assigned with responsibilities of Network Management] shall
harden all network devices as per the approved minimum security baseline documents.
14. All Information systems shall be logged out or sessions terminated automatically after a defined period of
inactivity
Page 33 of 192
5. All User access request records shall be maintained for reference & audit process for a period of (to be
decided by the Entity based on the risk, business need and any legal or regulatory requirements applicable to
the Entity or the specific information).
6. All records related to User access shall be destroyed on completion of the defined retention period.
7. Access to shared folders shall be authorized for business purposes only.
8. Users shall report any kind of misuse or unauthorized access of their access credentials or any other security
incidents related to User’s access.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
5. The [Information Security Section/Department or the function assigned with information security
responsibilities] in coordination with the Information Systems Owners, Business Processes Owners reserve the
right to review Users’ lists and ascertain the privileges granted.
6. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to review the use of high privilege ID’s at regular intervals.
Page 34 of 192
Operations Security Policy
Objectives
To ensure that activities concerning support and maintenance of data, technology, and application are controlled
and carried out in a standardized manner to reduce probabilities of errors and compromises, and to increase
efficiency and security. Objective outcome of effective operations management includes, but is not limited to:
• Improved security and reduce probabilities of compromise
• Reduced errors
• Controlled unauthorized activities
• Regulated efforts
• Increased efficiency
• Reduced security incidents
Scope
This policy applies to all Users who are responsible of operating and managing [Entity Name]’s IT infrastructure
and services.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. [System Administrators or the job title assigned with responsibilities of systems administration] are
responsible to adhere to this policy in their day to day activities.
7. [IT section/department or the function assigned with responsibilities of IT Management] is responsible to
ensure compliance with this policy.
Page 35 of 192
Policy in detail
Assets Inventory
1. All sections of [IT section/department or the function assigned with responsibilities of IT Management] shall
ensure having an up to date inventory of information systems such as, software, servers, appliances, devices,
tools, tokens, communication links, which are in use in [Entity Name]. The inventory shall also highlight the
information systems that were de-commissioned.
2. Access to the information systems inventory shall be restricted within group of employees of [IT
section/department or the function assigned with responsibilities of IT Management] and shall be shared
strictly on a need to know basis.
3. All IT assets must be assigned with owner/custodian who must maintain perpetual inventory control, a record
of the new location and new equipment custodian of all equipment issued to others.
Capacity Management
1. All sections of [IT section/department or the function assigned with responsibilities of IT Management] shall
ensure the availability of adequate capacity of IT resources to deliver the required IT services pertaining to
their areas of operations.
2. All sections of [IT section/department or the function assigned with responsibilities of IT Management]
shall conduct forecasting reviews to anticipate future needs of IT requirements for delivering the IT services in
alignment with the strategic direction of [Entity Name] and upcoming projects and initiatives. These capacity
requirements shall be documented as IT capacity plans.
3. All sections of [IT section/department or the function assigned with responsibilities of IT Management] shall
continuously monitor, analyze and evaluate the performance and capacity of all IT infrastructure and services,
to ensure that no excessive systems resources are consumed and there is no significantly degrading systems
response time.
Change Management
1. Changes to IT infrastructure shall be carried out in compliance with the [Entity Name] Change Management
Procedures (to be developed by the Entity based on the business needs).
Antivirus Management
1. All sections of [IT section/department or the function assigned with responsibilities of IT Management] shall
ensure that Antivirus software is installed on all information systems connected to [Entity Name] corporate
network.
Backup Management
1. Backup requirements shall be identified for all information systems connected to [Entity Name]’s corporate
network.
Page 36 of 192
2. Backup of information/data shall be performed as per the backup and archival requirements identified by the
respective information/Information Systems Owners.
Clock Synchronization
1. All systems clocks shall be synchronized using Network Time Protocol (NTP) to ensure the accuracy of audit
logs.
2. Users shall be restricted from changing the systems time.
Patch Management
1. [IT section/department or the function assigned with responsibilities of IT Management] shall ensure that all
information systems have the latest stable security patches installed to mitigate the risks associated with
vulnerabilities that may exist in the currently installed versions. This includes all servers, desktops, laptops,
applications, databases, medical devices, network devices, security devices and other IT systems etc.
2. Prior to deployment of patches in information systems, patches shall be validated and tested including
security patches and system upgrade patches.
3. [System Administrators or the job title assigned with responsibilities of systems administration] shall ensure
that a roll-back plan is identified before deploying any patch.
4. Timelines for patch implementation shall be defined and agreed with the respective information Systems
Owners and business owners.
5. [System Administrators or the job title assigned with responsibilities of systems administration] shall keep
record of the current level of patches deployed with respect to the information systems. The patch
management shall be performed in compliance with the Entity Patch Management Procedures (to be
developed by the Entity based on the business needs).
Page 37 of 192
Information Systems Security
1. All default accounts of information systems shall be renamed (where possible) and the default passwords shall
be changed.
2. [System Administrators or the job title assigned with responsibilities of systems administration] shall have
unique administration accounts separate from the normal accounts that are used for activities not related to
systems administration.
3. Minimum and only required administrative privileges shall be assigned to admin accounts to carry out the
required administration tasks.
4. Passwords of all High privilege accounts’ such as administrator, root etc. shall be set with at least 10
characters and complexity as per the Entity Password Policy.
5. [Information Security Manager or the job title assigned with responsibilities of managing information
security] shall be responsible to verify the usage of information systems high privilege accounts once in every
three months.
6. [System Administrators or the job title assigned with responsibilities of systems administration] shall not
change privileges to any account without proper authorization and approvals as per the Entity Access Control
Policy.
7. Any change in the configuration of information systems shall be done as per the Entity change management
procedure (to be developed by the Entity based on the business needs) where proper approval is obtained.
8. [System Administrators or the job title assigned with responsibilities of systems administration] of Domain
controllers shall not change, create or delete group policies without getting proper authorization and
approvals.
9. [System Administrators or the job title assigned with responsibilities of systems administration] shall harden
the information systems as per the approved minimum security baseline requirements (to be developed by
the Entity based on the business needs).
Page 38 of 192
4. [IT section/department or the function assigned with responsibilities of IT Management] shall have minimum
security baseline (hardening) documents for all critical IT information systems such as servers operating
systems, applications, databases, network and security devices etc.,
5. The security baseline documents shall be updated periodically to address the latest vulnerabilities.
6. The [Information Security Section/Department or the function assigned with information security] shall
review and sign-off on the baseline documents.
7. [System Administrators or the job title assigned with responsibilities of systems administration] shall
implement the applicable security baseline documents on all IT information systems prior to deployment.
[System Administrators or the job title assigned with responsibilities of systems administration] shall also
ensure that the information systems under their responsibility conform to these baselines requirements on an
ongoing basis.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 39 of 192
Electronic Communication Usage Policy
Objectives
To ensure information exchanged between authorized resources are secured within and across entity boundaries.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Electronic Communication Services Access Provisioning & De-Provisioning
1. Electronic communication accounts shall be created as per the Entity approved process.
2. Any generic or group email account shall have an owner assigned for accountability.
3. Electronic communication accounts de-provisioning (disabling) request shall be raised per [Entity Name]
approved process.
4. Electronic communication accounts de-provisioning (disabling) is valid under the following circumstances:
End of employee’s service.
Contractors completing their engagement.
If requested by the Director of the concerned department to which the user belongs.
If user found to have violated the policy or misused the provided service in any mean.
General Usage
1. All electronic communication resources provided by [Entity Name] shall be used for official purpose only.
2. Users shall refrain from using the official electronic communication resources for personal
communications/correspondences.
Page 40 of 192
3. All official electronic communication correspondences, unless otherwise specified, shall be treated as [The
Entity shall specify the classification level of information affected by this control, for example confidential
information or internal information or secret, etc.].
4. All electronic communication correspondences must be properly addressed to the intended recipient.
5. All Users shall be held responsible for any misuse of electronic communication correspondences from their
accounts, if proven to be as an intentional act from the User.
6. Users shall refrain from initiating or participating in any electronic communication or newsletters not related
to the job duties, such as forwarding chain emails whether commercial or with personal amusement and
entertainment content
7. Using the email to send or forward large attachments containing graphics/objects/video files that can result in
disruption of email services is prohibited.
8. Users shall make use of authorized file sharing tools, such as file servers or document management tools,
provided by [Entity Name] to share huge official attachments.
9. Users shall refrain from sending information, software, files or attachments that are illegal or unauthorized, or
include any defamatory, offensive, racist or obscene remarks.
10. Users shall refrain from accessing or using any electronic communication account of other Users, unless it is
authorized/delegated by the account owner with proper business justification and this shall be requested
from and processed formally by the responsible unit in [Entity Name] and without sharing the password of the
account.
11. Users shall refrain from using personal emails for official communications/correspondences.
12. Users shall be responsible for the protection of any local copy of mailboxes stored in their laptop or desktop.
13. Users shall be responsible to archive their emails As per the [Entity Name] approved archival procedure.
14. Users shall promptly report any kind of security incidents on the electronic communication resources as per
the [Entity Name] Information Security Incident Management process) that is to be developed by the Entity
based on the need).
15. A disclaimer and uniformed electronic email signature must be assigned on all outgoing electronic
communications and Users are prohibited from altering or removing details related to it.
16. Users shall refrain from sending email attachments that may spread viruses (such as .exe, .bat, .com, .scr, .vbs,
.jar etc.).
17. Users shall refrain from configuring automatic forwarding of official emails to non-[Entity Name] hosted email
system.
18. Official email distribution lists or group mailing lists (where appropriate) shall be created in coordination with
responsible section/team of electronic communication systems.
Page 41 of 192
Policy Compliance
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. Users shall be aware that the [Information Security Section/Department or the function assigned with
information security responsibilities] in coordination with the responsible section/team of electronic
communication systems reserves the right to monitor all official electronics communication channels to
ensure that electronics communication usage is as per this policy.
Page 42 of 192
Health Information and Security Policy
Objectives
The objective of this Policy is to ensure healthcare information are suitably protected by [Entity Name] to uphold
public trust and reliability on governmental interest and values, and to sustain entity reputation in the provisioning
of healthcare services.
Scope
This policy applies to all Health information managed, handled or processed by [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The [Director General or job title assigned with responsibilities of Entity’s higher management] of [Entity
Name] shall endorse this policy for its effective implementation.
Policy in Detail
Health Information Privacy and Protection
1. Orientation shall be conducted on healthcare information protection and sanctions to all employees, relevant
contractors and third parties prior to their access to healthcare information.
2. Process shall be established to ensure that access to health information systems and applications are
restricted for individuals possessing a valid license to practice their profession within the UAE, and any
exception shall be authorized by entity CISO based on adequate justification.
3. Cleaning staff access shall be restricted to areas where patient related healthcare information is being viewed,
accessed, used, processed, stored and/or destroyed are monitored or under surveillance coverage.
4. Processes shall be established to notify the health sector regulator of any probabilities of breaches involving
healthcare information.
Page 43 of 192
Core Principles
[Entity Name] recognizes that secure operations are dependent upon securing three core organizational elements,
which are people, process and technology. Thus, all [Entity Name] activities must adhere to the general principles
laid down. Where appropriate these principles are elaborated below to provide the basis by which [Entity Name]
security will shape the direction and conduct of security:
1. Maintain the confidentiality, integrity & availability of Information & Information assets.
2. Meet the UAE regulatory, statutory and legislative requirements.
3. Report and investigate all suspected breaches of Information Security.
4. Provide appropriate Information Security Training & awareness to all employees (permanent & contract
employees).
5. Design appropriate controls and procedures to support the implementation of this Information Security
Policy.
6. Ensure all stakeholders are responsible for implementation of respective security policies & procedures
within their area of operation, and oversee adherence by their team members.
7. Continually improve Information Security through implementation of corrective and preventive actions.
8. Prepare, maintain and test Business Continuity Plans in a practical manner based on the business needs.
9. Annually review this Policy for adequacy and appropriateness.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 44 of 192
Third Party Security Policy
Objectives
To ensure third party services are controlled through suitable procedural obligations and contractual terms to
secure privacy and protect information assets. To establish a suitable framework for third party management and
define a control environment that shall:
• Reduce probabilities of information leakage and loss
• Secure information assets
• Minimize unauthorized access and usage
• Uphold organizational and governmental reputation
• Ensure service continuity
Scope
This policy applies to all Users of [Entity Name] and it covers all kinds of information and information processing
facilities that are accessed, communicated to, or operated by Third Parties.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. Projects Owners/Projects Managers are responsible for ensuring compliance to this policy.
Policy in Detail
Note: All contractual agreements with Third Parties shall be in compliance with the regulations the Entity follows in
this context. The implementation of this policy shall be in alignment with the laws or regulations applicable to the
Entity.
Page 45 of 192
2. Due diligence shall be exercised while evaluating Third Parties services to ensure accuracy of their claimed
qualifications and successful delivery of contractual obligations.
3. Project Managers in coordination with Project Owner shall ensure that contractual agreements in terms of
legal, business and technical requirements are negotiated and agreed with the Third Parties, before
commencing the project.
Page 46 of 192
Identification of Risks related to Third Parties
1. The [Information Security Section/Department or the function assigned with information security
responsibilities] shall ensure that the periodic information security risk assessment identifies potential Third
Parties risks that could compromise the Confidentiality, Integrity & Availability of Information & information
processing facilities.
2. Project Manager in coordination with [Information Security Section/Department or the function assigned
with information security responsibilities] shall identify any additional information security risk specific to the
project.
3. The analysis of risks related to Third Parties access to information and information processing facilities shall
consider the following:
Possible impacts to the controls of the information processing facilities;
The classification of the information assets;
Processes for identifying, authenticating ,authorizing and reviewing access rights of the Third
Parties; and
Security controls that are in place to control storing, processing, communicating, sharing or
exchanging information.
4. All risks identified shall be appropriately addressed through risks mitigation measures.
Third Parties Access Management
1. The Third Parties shall be provided access to information & information processing facilities as per the Entity
Access Control Policy.
2. The Third Parties shall be provided access to information & information processing facilities on the principles
of need to know basis.
3. The provisioning of Third Parties access to information & information processing facilities shall be granted on
temporary basis. Wherever feasible, this access shall be configured with specific end date so that it gets
expired at the end of the contract.
4. The usage of non-[Entity Name] managed laptops by the Third Parties shall be based on approval from
[Technical Support Section or the function assigned with technical support], after being authorized by the
respective senior management and having proper business justifications.
5. Third Parties shall not be granted with remote access before obtaining prior approval as per the [Entity Name]
Remote Access Policy.
Page 47 of 192
2. Security events logging shall be fully activated for all information processing facilities to which access is
provided to Third Parties as per the contractual obligations.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 48 of 192
Information Systems Acquisition, Development, and Maintenance
Security Policy
Objectives
To emphasis the need for healthcare entities to adopt secure system and software development lifecycle
management processes and to ensure that systems and applications in use are securely managed and supported to
avoid misuse of privileges and authority, reduce probabilities of information, system and application compromises,
and to uphold Entity and Abu Dhabi government’s reputational value and public trust.
Scope
This policy applies to all Users and third party personnel of [Entity Name], involved in the Acquisition,
Development and Maintenance of Information Systems and Applications.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. Projects Owners/Projects Managers are responsible for ensuring compliance to this policy.
Policy in Detail
Security Requirement of Information Systems and Applications
1. All Information systems acquired and developed shall be aligned with the business requirements and shall be
supported by the relevant documentation, approved by the respective Business owner.
2. All Information systems acquired and developed shall be relevant to the business requirements of [Entity
Name] and shall be supported by business requirement documents.
3. All Information System and Application acquisition initiatives shall be documented and approvals from Head of
the sections shall be obtained.
Page 49 of 192
4. All statements of business requirements for new information systems or enhancements to existing
information systems shall specify control and system security requirements. It is the responsibility of the Head
of the business section who develops the statements of business requirements to identify these security
requirements with the help of Information Security Team.
5. Information Systems Security requirements shall reflect the business value of the related Information Assets
and the potential damage that may be caused due to absence of protection mechanisms.
6. Information system design documents, addressing the security requirements shall be developed and
approved.
7. Security requirements shall include:
a) User authentication;
b) Access provisioning and authorization processes, for business users as well as for privileged or
technical users;
c) Informing users and operators of their duties and responsibilities;
d) Protecting Information Assets as per the Information Classification and Handling Policy;
e) Business processes specifics, such as event logging and monitoring, non-repudiation required;
f) Mandatory security controls, e.g. interfaces to logging and monitoring or data leakage detection
system.
Encryption Requirements
1. The need for encryption shall be identified by information owners based on the evaluation of information
assets in terms of confidentiality, Integrity and availability, as per the information assets classification policy of
the Entity.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 50 of 192
Information Security Incidents Management Policy
Objectives
To ensure that healthcare entities define and utilize suitable processes and resources to identify and respond to
information security and cyber security incidents, that they are not severely impacted by incident outcomes and
that they are able to restore affected operations within an acceptable timeframe.
Scope
This policy applies to all Users of [Entity Name]. It covers all type of information security incidents that occurs or
suspected to target on any information or information processing facilities owned or managed by [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Incident Reporting and Recording
1. All information security incidents shall be reported to the [Information Security Section/Department or the
function assigned with information security responsibilities] as per the Entity information security incidents
management procedure (to be developed by the Entity based on the business needs).
2. All information security incidents reported shall be recorded by the [Information Security
Section/Department or the function assigned with information security responsibilities] with the relevant
details such as:
Detailed description of the information security incident including time of incident.
Details of the user(s) who reported the information security incident including contact details.
Asset/service affected by the information security incident (or thought to have been affected).
Page 51 of 192
Damages observed including any other security events/violations occurred.
Information security Incident status – occurred / ongoing / may occur.
Details on how the information security incident was discovered/detected.
Reference of any similar occurrences in the past.
Supporting evidence.
Remedial steps taken, if any.
Information security Incident classification.
Incident Response
1. After recording the incident details, the [Information Security Section/Department or the function assigned
with information security responsibilities] shall do preliminary analysis to determine the validity of reported
incident.
2. All valid security incidents shall be classified based on the severity by the [Information Security
Section/Department or the function assigned with information security responsibilities] in consultation with
the [Information Security Manager or the job title assigned with responsibilities of managing information
security] as Very High, High, Medium and Low. Refer to information security incidents classification table in
policy appendix.
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] shall take corrective actions to contain the incident. If deemed necessary the [Information
Security Manager or the job title assigned with responsibilities of managing information security] shall
inform affected business owners about the incident.
4. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] shall constitute an Incident Response Team (IRT) for carrying out incident response activities.
5. The IRT shall include permanent members, and members designated from other affected business units,
based on the asset/service affected by the information security incident and its criticality. Permanent
members shall include the [Information Security Manager or the job title assigned with responsibilities of
managing information security], and other members from the [Information Security Section/Department or
the function assigned with information security responsibilities].
6. The IRT shall carry out root cause analysis and take corrective actions to contain and eradicate the incident.
7. The outcome of the root cause analysis and all actions taken shall be recorded and a separate database shall
be maintained as Security Incident Management Database (SIMDB)
8. Incident shall be monitored from its identification till closure. Based upon the progress, the incident records
shall be updated on a continuous basis.
9. Users, customers, stakeholders and management shall be kept informed about the progress of incidents, as
necessary.
Page 52 of 192
Post Incident Analysis and Actions
1. The [Information Security Section/Department or the function assigned with information security
responsibilities] shall prepare a detailed incident report. This report shall be submitted to the [Information
Security Manager or the job title assigned with responsibilities of managing information security].
2. Types, volumes, trends and costs of information security incidents shall be quantified, analyzed and recorded.
3. The outcome of the incident analysis may lead to revaluation of existing policies, development of additional
security controls and/or disseminate user awareness programs.
4. The information security incident report shall by default be classified as confidential irrespective of severity or
rating of the incident.
5. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] shall advise on the preventive controls to be implemented to avoid the occurrence of similar
incidents.
6. All information gained from post-incident analysis shall be recorded in the Security Incident Management
Database (SIMDB) for future references.
7. All evidences collected shall be retained for at least 1 year from the time of incident, wherever required the
evidence shall be presented to relevant authorities.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
5. All Users shall report any known or suspected information security incidents immediately.
6. Anonymity of User reporting a suspected incident shall be maintained, unless the matter is referred
to a court of law.
Page 53 of 192
Policy Appendix:
Information Security Incidents Classification
The below table provides a suggested approach for classifying information security incidents, which can be
modified based on the risk and business needs of the Entity:
Page 54 of 192
2. SLA Matrix
Resolution Notification to
Incident Acknowledgement Incident Resolution
DoH SoC
Within 1 hour of incident Within 4 hours after the Within 2 hours of incident
SLA
communication/observation incident is reported resolution
P2 – Severe
Within 1 hour of incident Within 24 hours after the Within 8 hours of incident
SLA
communication/observation incident is reported resolution
P3 – Elevated
Within 1 hour of incident Within 48 hours after the Within 24 hours of incident
SLA
communication/observation incident is reported resolution
P4 - Normal
Page 55 of 192
Information Systems Continuity Policy
Objectives
To ensure systems, applications and resources are available to support service continuity requirements of
identified critical services and processes during abnormal situations or environment.
Scope
This policy applies to all Users of [Entity Name], and it covers all [Entity Name] IT infrastructure, IT Services,
Information Systems, health systems and Non-IT services.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. Services Owners are responsible for developing Service Continuity (SC) Plans for their respective services in
coordination with [Information Security Section/Department or the function assigned with information
security responsibilities].
7. Service Continuity Team (to be structured by the Entity) is responsible for participating in the recovery drills
and verifying the functionality of the applications / processes / tests with respect to the defined and agreed
scope.
Policy in Detail
Identification of Services Continuity Team Members
1. Service Continuity (SC) Team shall be appointed by the Entity top management to establish, implement and
maintain the Service Continuity Management System within [Entity Name].
2. Services Continuity Team members shall be selected from different departments/ sections of [Entity Name],
as per the selected scope for implementation.
3. The implementation of the Services Continuity Management System shall be monitored by top management.
Page 56 of 192
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 57 of 192
Compliance Policy
Objectives
The objectives of this Policy are:
To define the process and guidelines to be followed, for the purpose of implementing the statutory and
regulatory contractual requirements of [Entity Name] related to information security.
To comply with the applicable UAE laws, Intellectual Property Rights (IPR), contractual obligations with
vendors and contractors.
Scope
This Policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Identification of Applicable Legislation
1. Based on the risk assessment, [Information Security Section/Department or the function assigned with
information security responsibilities] shall identify list of legal and regulatory laws pertaining to information
security that are applicable to the Entity.
2. List of applicable statutory and regulatory requirements pertaining to information shall be documented and
approved by the top management.
3. [Legal affairs section/department or the function assigned with responsibilities of legal affairs] shall ensure
that adequate clauses in relation to information Security are considered in the standard contract templates
used in [Entity Name]. The contractual clauses may also include the following minimum controls, based on the
criticality of the contract:
Compliance with legal and regulatory requirements.
Page 58 of 192
Compliance with Intellectual property rights requirements.
Compliance with information security policies and procedures.
Clear allocation of responsibilities to all the involved parties.
Statement on Non – Disclosure of information.
[Entity Name]'s rights to review and audit the compliance with the contracts.
Adequate Service Level Agreements (SLA), where applicable.
4. [Entity Name] contract templates shall be reviewed by [Information Security Section/Department or the
function assigned with information security responsibilities] to ensure inclusion of information security
requirements as mentioned in the above point.
5. [Information Security Section/Department or the function assigned with information security
responsibilities] shall ensure that proper information security controls are implemented to comply with
statutory and regulatory requirements applicable to [Entity Name].
Page 59 of 192
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 60 of 192
Acceptable Usage Policy
Objectives
The objective of this policy is to outline the controls of acceptable usage of information and information systems of
[Entity Name]. Adherence to this policy would reduce any potential misuse of information processing facilities of
the Entity.
Scope
This policy applies to all Users of [Entity Name], and it addresses the use of all information and information
processing facilities that are required by Users to carry out their daily business activities.
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing Entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Acceptable Use of Information
8. Users shall ensure that information regardless of its form (electronic or physical) is classified appropriately to
avoid loss of confidentiality & integrity of the information.
9. Users shall ensure that information shall be accessed on a strictly “need to know” basis based upon the
classification of information.
10. Users shall refrain from discussing [The Entity shall specify the classification level of information affected by
this control, for example confidential information or internal information or secret, etc.] under the following
circumstances:
In the presence of an outsider or other employees who do not have the ‘need to know’ that information
regardless of the physical location and the medium of communication.
Page 61 of 192
While using Internet based communication channels such as public forums, blog sites, social networking
sites, public mailing list, etc.
11. Users shall not share or send [The Entity shall specify the classification level of information affected by this
control, for example confidential information or internal information or secret, etc.] outside office premises
without prior approval from the Entity's respective higher management or the assigned owner of the
information.
12. Users shall ensure that proper authorization is obtained from the Business Processes/Information Owner and
[Information Security Section/Department or the function assigned with information security
responsibilities] on the usage of removable media to store and transfer [The Entity shall specify the
classification level of information affected by this control, for example confidential information or internal
information or secret, etc.].
13. Users shall make use of the Entity’s approved file sharing tools/mechanisms for all kinds of electronic
information exchange (i.e. sharing documents with a colleague or an external party).
Access Control
1. Users shall be aware that all access privileges shall be allocated on a “need to use” basis, only the minimum
privileges required for the User’s functional role shall be allocated.
2. Users shall refrain from accessing information systems with credentials of other employees or affiliates.
3. Users shall maintain their exclusive access privileges on information systems by not allowing any one else to
operate from their account.
Passwords Usage
1. Users shall not share their passwords with anyone including their colleagues, friends, family members etc..,.
2. Passwords shall be unique in nature. Users shall avoid using the same password for all systems/applications.
3. Users shall take extreme caution while using passwords in public places or in the presence of other people.
4. Users shall be cautious while entering passwords and ensure that passwords are entered only in the correct
password field provided.
Page 62 of 192
5. Users shall ensure that passwords are not stored in clear text in any form.
Internet Usage
1. Users should make use of internet primarily for official purposes and to fulfill the obligation towards their day
to day business operation.
2. Users are not allowed to post statements/information or comments on the internet that could damage the
reputation of Abudhabi Government and/or their entities.
3. Users shall refrain from using the internet to download, upload or install any software from the internet or any
other third parties unlicensed software or program on any hardware/equipment belonging to [Entity Name],
unless the User is authorized according to the nature of his/her work.
Physical Security
1. Employees shall visibly wear the employee ID card issued by the [HR section/department or the function
assigned with HR responsibilities] while they are inside the premises of Entity.
2. Visitors shall be escorted at all times by an authorized employee while in [Entity Name] premises.
3. Users shall refrain from entering critical areas (such as data center, filing rooms) without having business
justification and without authorization from the respective owner.
Page 63 of 192
1. Users shall promptly report information security incidents either to [Information Security Manager or the job
title assigned with responsibilities of managing information security] or any member of [Information
Security Section/Department or the function assigned with information security responsibilities].
2. Users shall support the information security incident response team, to contain the incident and take
necessary corrective & preventive actions.
3. Users shall refrain from tampering any source of evidence or audit logs on information systems that may be
required for future audit and prosecution purposes.
Policy Compliance
5. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
6. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
7. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
8. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 64 of 192
Antivirus Policy
Objectives
The objective of this policy is to outline the protection controls from malicious codes (such as Virus, Spyware,
malware, Trojans) etc., which may harm Computer Devices and servers of the entity, and to establish the
requirements for addressing any problems resulting from such infections.
Scope
This policy applies to all Users and physical assets (information and computing resources including Desktops,
Laptops and Servers) of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. [System Administrators or the job title assigned with responsibilities of systems administration] who are
administering the antivirus system are responsible to implement the policy and centrally monitor and analyze
the logs of the system.
Policy in Detail
Antivirus Installation
1. The [Technical support section or the function assigned with Technical support] shall ensure that all Desktops
& Laptops are installed & configured with the official antivirus software.
2. The [System Administrators or the job title assigned with responsibilities of systems administration] of
servers shall ensure that all servers are installed & configured with official antivirus software.
3. The Antivirus software shall operate on a real time basis on all servers, desktops and laptops.
Page 65 of 192
4. Server machines running exclusively on UNIX-based operating systems where the risk of viruses is minimal,
may not have anti-virus software installed.
5. Antivirus software shall be configured to do a full system scan once in a week and a real time scan of all the
files from external storage media when they are accessed, copied or moved.
6. The antivirus software shall be configured to clean the malicious contents automatically.
7. Antivirus software shall be configured to quarantine the infected files if they cannot be cleaned.
8. Antivirus software on the E-mail Servers at the gateway level shall be configured for scanning all internal and
external mails.
9. Antivirus scanning shall be enabled automatically as and when the Desktops, Laptops, and Servers are
started/restarted.
10. Users shall be trained to use antivirus software. However Users shall not be allowed to install and un-install or
change the configuration settings of the Antivirus Software.
Page 66 of 192
Third Party Access
1. Third Party personnel shall not be allowed to connect Laptops/Desktops to the [Entity Name] network without
updated Antivirus signature.
2. The [Technical support section or the function assigned with Technical support] shall verify that the third
party user’s desktop and laptop do not contain any virus or other vulnerabilities that could affect the [Entity
Name]'s network before being connected to LAN.
Incident reporting
1. [System Administrators or the job title assigned with responsibilities of systems administration] who are
administering the antivirus system shall review and report the identified malicious code/content as per the
Information Security Incident Management process, that is to be developed by the entity.
2. Users shall report any malicious content detected, configuration change or any unusual behavior in their
systems to the [Information Security Section/Department or the function assigned with information security
responsibilities].
3. Users shall ensure that if a laptop/ desktop is thought to be infected by a virus, it shall be immediately
disconnected from [Entity Name]’s network.
Page 67 of 192
Change Management
1. All changes concerning Antivirus server / application and configuration settings shall follow the [Entity
Name]’s Change Management Process (to be developed by the entity based on the business needs).
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 68 of 192
Clear Desk and Clear Screen Policy
Objectives
The Objective of Clear Desk and Clear Screen Policy is to ensure that information is protected from prying eyes and
opportunistic breaches, which may lead to compromise in Confidentiality, Integrity and Availability of the
information.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Clear Desk
1. Users shall store paper documents and electronic media that are classified as [The entity shall specify the
classification level of information affected by this control, for example confidential information or internal
information or secret, etc.] in locked cabinets.
2. Users shall keep their desks clean and clear of [The entity shall specify the classification level of information
affected by this control, for example confidential information or internal information or secret, etc.] when
leaving the office unattended.
3. User shall ensure that [The entity shall specify the classification level of information affected by this control,
for example confidential information or internal information or secret, etc.], when printed or transmitted,
shall be removed from printers and fax machines immediately.
4. Users shall ensure to protect the [The entity shall specify the classification level of information affected by
this control, for example confidential information or internal information or secret, etc.] incoming and
outgoing fax messages, postal mails etc. and do not leave them unattended.
Page 69 of 192
5. Users shall ensure all [The entity shall specify the classification level of information affected by this control,
for example confidential information or internal information or secret, etc.] /notices shall not be pinned, on
the pin boards in front of the desk and notice boards.
6. Users shall ensure that [The entity shall specify the classification level of information affected by this control,
for example confidential information or internal information or secret, etc.] written on the white boards shall
be wiped off, once the discussion is complete, and shall ensure that such information is not visible from
outside the room during the meeting.
7. Users shall ensure keeping their laptops in locked drawers or cabinets once leaving the office.
Clear Screen
1. Users shall ensure that they lock the computer screen when leaving their desks.
2. All workstations shall have password protected screen savers enabled and activated after a defined period of
inactivity.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 70 of 192
Information/Data Backup Policy
Objectives
The objective of this policy is to define adequate back up requirements for the critical information and data of
[Entity Name] and ensure their availability in the event of disruption.
Scope
The scope of this policy covers all the information / data stored and processed in production, development, test
environments, file servers, as well as network and security devices owned by [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The Business Processes Owners and [Senior Management or job titles assigned with responsibilities of
managing entity’s business divisions and sections] are responsible for ensuring that the backups are
Page 71 of 192
Policy in Detail
Backup Requirements
1. Information / data Backup requirements of all information systems within [Entity Name] shall be identified
and documented.
2. Information / data stored locally on Users’ computers will not be included in scheduled backup. Thus, Users
shall transfers their data onto their network drive folders so that it will be included in the scheduled backup.
3. The Business Processes Owners or [Senior Management or job titles assigned with responsibilities of
managing entity’s business divisions and sections] shall decide on the minimum back up requirements for
their respective information / data and information processing systems.
4. The Business Processes Owners or [Senior Management or job titles assigned with responsibilities of
managing entity’s business divisions and sections] shall decide on the frequency and type of back up for their
respective application, database and operating systems and network devices.
5. The [Backup team or the function assigned with responsibilities of backup management] shall record and
maintain the backup requirements for all information systems. The details shall include information/data to be
backed up, backup frequency, storage media, retention and disposal.
Backup Schedule
1. Backup of information / data shall be taken regularly as defined by Business Processes Owners or [Senior
Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] to ensure information/data is available in the event of failure of information processing systems.
2. The [Backup team or the function assigned with responsibilities of backup management] shall perform a
minimum level of backup for each server hosting actual production data as agreed with business owners.
3. The [Backup team or the function assigned with responsibilities of backup management] shall ensure that
any newly commissioned server into production is included for the minimum level of data backup.
4. In the event of schedule backup failure, the [Backup team or the function assigned with responsibilities of
backup management] shall ensure rescheduling of backup and shall keep the business owners informed on
the same.
5. The [Backup team or the function assigned with responsibilities of backup management] shall identify the
root cause for the failure of backup and the same shall be documented and shared with Business owner
6. Backup of systems, applications, devices, etc. shall be taken before and after applying any changes, such as
upgrades, patching, etc.
Page 72 of 192
2. All backup media must be clearly identified in a consistent manner.
3. Backup copies of critical data must be maintained at an identified offsite location.
4. The offsite location for storage of backup tapes must be in a separate geographic region with a minimum
distance of 40 KMs from the onsite location.
5. Offsite backup must be maintained in a fire resistant enclosure and must be covered with appropriate physical
security.
6. Access to backup media while onsite, in-transit, or offsite must be restricted.
7. If backup tapes are discovered to be damaged or corrupted, then these tapes must be destroyed.
8. All backup media shall be disposed-off in a secure manner at the end of their life, according to their retention
period, or if found to be corrupted or damaged, and the disposal procedure must ensure the following:
The media is properly degaussed.
Labels/tags containing reference to [Entity Name] internal information are removed
Tapes and others non-reusable data storage media are physically destroyed.
9. A detailed schedule for the movement of back tapes to offsite location shall be documented and a record for
the movement of tapes to & from offsite location shall be maintained.
10. All backup tapes must be regularly transported to the offsite storage location as defined by Business Processes
Owners or [Senior Management or job titles assigned with responsibilities of managing entity’s business
divisions and sections] in coordination with the [Backup team or the function assigned with responsibilities
of backup management].
11. Handling backup media must be done according to the manufacturer’s recommendations and guidelines to
prevent damage.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
Page 73 of 192
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
Page 74 of 192
Internet Usage Policy
Objectives
The objectives of this policy are to:
Ensure efficient and reliable internet usage for all Users in [Entity Name].
Protect confidential information and intellectual properties belonging to [Entity Name] and ensure that any
risk of exposure is minimized.
Manage and improve Users’ productivity and optimize the use of information technology infrastructure by
controlling and monitoring the use of internet service.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
Policy in Detail
Internet Service Access Provisioning & De-Provisioning
1. Access to internet service shall be granted as per the [Entity Name] Access Control Procedures (to be
developed by the entity based on the business needs).
2. De-Provisioning of access to internet service shall be raised as per the [Entity Name] Access control
Procedures (to be developed by the entity based on the business needs).
3. Internet service access de-provisioning is valid under the following circumstances:
End of employee’s service
Contractors completing their engagement
Page 75 of 192
If requested by the Director of the department which the user belongs to.
If user found to have violated the policy or misused the provided service in any mean.
General Usage
1. Users shall make use of internet primarily for official purpose and to fulfill the obligation towards their day to
day business operation.
2. Users may use the internet for limited personal use as long that it doesn't violate the entity policy or affect the
entity business.
3. Users shall refrain from misusing the internet access through using any automated tools to gain or attempted
to gain unauthorized access or entry into any third party’s systems or devices.
4. Users shall not use unauthorized means of accessing internet such as personal broad band modems,
unauthorized wireless access points etc..,
5. Users shall refrain from engaging in any activity that may result in the disruption of operations of the internet
service or information systems of [Entity Name].
6. Users shall refrain from posting, disclosing or sharing information pertaining to [Entity Name] that is specific,
proprietary or [The entity shall specify the classification level of information affected by this control, for
example confidential information or internal information or secret, etc.] in nature on the internet including
online forums, groups, anonymous File Transfer Protocol (FTP) servers or any other open online platform.
7. Users are not allowed to post statements on the internet that could misconstrue the reputation of [Entity
Name].
8. Users are prohibited from accessing legally or morally offensive websites that contain or support violence,
criminal or illegal behavior, extreme religious or political sentiments or opinions or abusive statements related
to social aspects, age, race, gender, rituals or religious beliefs.
9. Users shall refrain from using non official messaging or chatting channels such as online messenger
applications or internet chatting channels while connected to the entity’s network.
10. Users shall refrain from using the internet to download, upload or install any software from the internet or any
other third party’s unlicensed software or program on any hardware/equipment belonging to [Entity Name].
11. Users shall refrain from downloading audio and video files or any non-business related files.
12. Users shall refrain from attempting to change and/or remove the browser settings configured to use the proxy
and any direct dial up connection from a system connected to the network.
13. Users are prohibited from using the internet for their own commercial-related gain(s) that falls outside the
scope of their employment or business engagement.
14. Users are not allowed to download, copy or transmit to/from the internet, any other person’s works,
documents or any other forms of intellectual property belonging to a third party without the third party’
Page 76 of 192
express permission nor shall the Users do any act which may expose the Users or [Entity Name] to claims of
intellectual property rights infringements.
15. Users shall report any internet usage violations or suspicious activities as per the entity Information Security
Incident Management process (to be developed by the entity based on the business needs).
16. [Entity Name] reserves the right to block any websites considered to be non-secure, non-business related or
that may affect the performance of the internet services.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
5. Users shall be aware that the [Information Security Section/Department or the function assigned with
information security responsibilities] in coordination with the [Networking section or the function assigned
with responsibilities of network management] reserve the right to monitor the internet usage to verify
compliance to this policy.
Page 77 of 192
Password Security Policy
Objectives
The objective of this policy is to define and provide guidelines for Users in choosing secure passwords and identify
protection controls of those passwords.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. All [System Administrators or the job title assigned with responsibilities of systems administration] are
responsible to implement the policy on all Users accounts.
Policy in Detail
Users Passwords Security Controls
1. All passwords are categorized as [The entity shall specify the classification level of information affected by
this control, for example confidential information or internal information or secret, etc.]. Users shall not
share or disclose passwords to any user (including Managers, IT administrators, etc..,)
2. Passwords shall be unique in nature. Users shall avoid using same password for all systems/applications
3. Users shall set strong passwords matching the following criteria:
Minimum length of password should be eight characters or [to be decided by the entity based on the
risk and business needs].
Should contain a combination of alpha numeric characters and at least one special character.
Should contain both upper and lower case characters.
Page 78 of 192
Not to be repeated within a cycle of 3 passwords changes [to be decided by the entity based on the
risk and business needs].
Not to be easily guessable and must not contain:
o Names of family members, pets, friends etc..,
o The name of popular places, (i.e. "Abudhabi", "Singapore" or any derivation.).
o Birthdays and other personal information such as address and phone numbers.
o Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc..,
4. Passwords should not be blank or similar to the username.
5. Use of generic ids or group accounts is prohibited to ensure accountability. In case where the business need
arises for such usage, one user from the group shall be identified to be responsible for all activities carried out
of such accounts.
6. List of generic IDs with owners and Users shall be documented, and reviewed by the [Information Security
Section/Department or the function assigned with information security responsibilities].
7. Users shall take extreme care and diligence while using passwords in public places or in the presence of other
people.
8. Users shall be very cautious while entering passwords and ensure that passwords are entered only in the
correct password field provided.
9. Users shall refrain from using the "Remember Password" feature of any Information systems/application.
10. Passwords shall not be stored in a form that can be subjected to unauthorized views e.g. written and openly
kept on desks, pasted on computer screens with the help of post-aids, etc.
11. Passwords shall not be stored in clear text in the form of scripts, source codes, etc.
12. Users shall report any compromise or suspected changes in their accounts as per the information security
incidents management procedures of the entity.
Page 79 of 192
6. All information systems/applications shall be configured to enforce Users to change their passwords after a
password is reset.
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
5. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to perform random checking of passwords to ensure its complexity as
defined in the policy.
Page 80 of 192
Remote Access Security Policy
Objectives
The objective of this policy is to mitigate the risk of potential exposure of information and information processing
facilities of [Entity Name] while accessing it remotely through the approved virtual private network or other
encrypted channels.
Scope
This policy applies to all Users of [Entity Name].
Responsibilities
1. The [Information Security Manager or the job title assigned with responsibilities of managing information
security] is responsible for development, maintenance, enforcement and endorsement of the policy.
2. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to support the relevant business unit / section in implementation of the defined
controls and ensuring compliance with this policy.
3. All Users are responsible to read, understand and adhere to this policy in their day to day activities.
4. The [Information Security Section/Department or the function assigned with information security
responsibilities] is responsible to conduct awareness about the policy to Users.
5. [Senior Management or job titles assigned with responsibilities of managing entity’s business divisions and
sections] and Business Processes Owners are responsible for compliance to this policy within their area(s) of
concern.
6. The [Network section or the function assigned with responsibilities of network management] is responsible
to implement the defined security controls on the Remote Access technology being used by [Entity Name].
Policy in Detail
Remote Access Provisioning & De-Provisioning
1. Remote Access to [Entity Name]’s infrastructure shall be provided strictly on approval from the [Information
Security Manager or the job title assigned with responsibilities of managing information security] and the
director/manager of the User.
2. Users shall be granted Remote Access with proper business justification falling under any criteria as
mentioned below:
Users who have compelling date to complete tasks/projects.
Users working on tasks/projects which requires remote connection after working hours.
Page 81 of 192
Users of Remote Access shall be provided with an end date to the access. Users requiring access
beyond the specified end date shall renew their access.
3. Remote Access de-provisioning is valid under the following circumstances:
Users no longer require access to the relevant network or when the temporary access permission
granted to the User expires and no renewal have been requested.
End of employee’s service.
If requested by the Director of the concerned department to which the user belongs.
If user found to have violated the policy or misused the provided service in any mean.
If Users have not used the Remote Access for 90 days from the time it has been granted.
Usage Controls
1. Users shall be aware that the remote access is considered as privilege access and all Users provided with
remote access shall be governed by this policy.
2. Users shall refrain from sharing or disclosing remote access credentials with any individuals.
3. Users shall be held responsible for any misuse of his/her login credentials.
4. Users shall ensure that devices used to connect to [Entity Name] network remotely shall have the anti-virus
software enabled.
5. Users shall report any violations or suspicious activities found in the remote access, as per the Information
Security Incident Management Procedures of the entity (that is to be developed by the entity based on the
need).
6. Users shall be aware that all activities carried out using remote access is being logged and monitored.
General Controls
1. Remote Access shall be strictly controlled and monitored by the [Network section or the function assigned
with responsibilities of network management]
2. Strong authentication mechanism with two factor authentication shall be configured for all Remote Access
while accessing information or information system through VPN.
3. The installation and configuration of all software and hardware functionalities related to remote access shall
be undertaken by the authorized [Technical support administrators or the job title assigned responsibilities
of technical support].
4. All Users shall have Remote Access with minimum necessary access rights required.
5. All remote connections made to [Entity Name] network shall be done through the approved Virtual Private
Network.
6. Users shall refrain from using freeware or shareware applications for remote access or connect remotely to
[Entity Name]’s network for vendor technical support. Usage of such applications requires approval from
Page 82 of 192
[Information Security Manager or the job title assigned with responsibilities of managing information
security] on a case to case basis.
7. Users shall use only the approved web conferencing and desktop sharing applications for the purpose of
products demo, POC, etc. [list of approved applications can be provided].
Policy Compliance
1. Any violation or breach to the policy may be subject to HR disciplinary procedure in accordance with [Relevant
HR Law], the Code of Conduct for Employees and any other applicable UAE Laws in this regard.
2. If Users are unsure or not clear of anything in this policy, they should seek clarification or advice from
[Information Security Section/Department or the function assigned with information security
responsibilities].
3. The [Information Security Section/Department or the function assigned with information security
responsibilities] reserves the right to check the compliance of this policy on a periodic basis.
4. Any exceptions to this policy with valid business justification require approval from [Information Security
Manager or the job title assigned with responsibilities of managing information security] on a case to case
basis.
5. Users shall be aware that the [Information Security Section/Department or the function assigned with
information security responsibilities] in coordination with the [Network section or the function assigned with
responsibilities of network management] reserve the right to monitor the usage of all activities carried
through Remote Access.
Page 83 of 192
Section 4 – Controls Implementation
This section contains detailed information for the implementation of each control. These
guidelines assist in the correct implementation of the selected control.
The Human Resource Security domain requires the entity’s awareness of the risks related to
human resources and provides guidance to the entity to establish adequate contractual,
administrative, technical and process-oriented controls to minimize probabilities of:
Information leakage
Unauthorized access
System compromise
Misuse of privilege, facilities and information
Loss of information
Credential sharing and misuse
The entity’s management should be aware that human resources are easy targets for social
engineering and phishing attacks, and can be involved in accidental or deliberate attempts to
cause disruptions to the entity’s services. The entity management should also specifically
evaluate the risk environment created by the use of third party and contract resources.
Risks from administrative and cleaning staff are often ignored but they pose new challenges
and threats to healthcare entities. The entity’s management should apply adequate control
measures to address those risks.
The Human Resources Security Policy should support the implementation of the Human
Resources Domain controls along the entire employment life cycle: prior to employment,
during employment, and at termination or change of employment. The policy can, for example,
contain:
A. Specification of the groups to be covered by the scope of the policy (all users with access to
information assets).
Page 85 of 192
B. Management roles and responsibilities during each phase of the employment life cycle
including background verification and enforcing awareness training.
C. Employment terms and conditions including code of conduct / non-disclosure agreements /
confidentiality agreements.
D. Mandatory information security awareness and training during employment in line with
controls HR 3.1 to HR 3.4.
E. Disciplinary process for security breaches.
F. Employment termination procedures and checks including return of assets, access revocation
and notification.
Depending on the size and structure of the entity, the Human Resources Security Policy can be
included as part of a single general information security policy document, or can be split up into
multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Human Resources Security Policy, this domain has the following
supporting or dependent entity policy references:
1) Information Security Management Policy
2) Acceptable Usage Policy
3) Compliance Policy
4) Disciplinary Actions Policy
HR 2 Prior to Employment
Subject to restrictions from privacy and employment legislation, background verification checks
should be conducted on all candidates for employment as well as for contractors and third-
party staff.
This verification is to be conducted by the entity independent of the checks done by the
Department of Health for health professional licensing as well as the checks done by the Labor
and/or Immigration Departments during the visa approval process.
The background verification should result in an accurate capture of an employee’s identity,
professional credentials and work history. Employee details should be periodically reviewed to
ensure that they are current and accurate, particularly frequently changing fields like contact
information and addresses.
Background verification could include a check on the accuracy of the applicant’s CV, check on
academic qualifications and professional memberships, verification of work and personal
Page 86 of 192
references, identity verification as well as police and credit checks. The details to be verified
should be defined based on the role of the employee. Where the job entails access to
information systems handling health information, financial information or any other highly
confidential information, more detailed checks should be done. These requirements should be
re-evaluated on change of role or promotion of the candidate. A record of the background
verification should be retained for audit purposes.
Privacy of candidates should be respected at all times and only authorized staff should have
access to verification data. A procedure should define background verification criteria and
process. Candidates should be made aware of this verification requirement.
Where staff are provided by a third party on a contractual basis, the contract with the agency
should clearly specify the agency’s responsibilities for screening and the notification protocols if
background verification is incomplete or fails. The entity’s Procurement and Legal Departments
may be involved in this.
The ultimate aim should be to ensure integrity, competence, professionalism and information
security awareness across all levels of staff of the organization.
The Terms and Conditions of employment may contain general information security
requirements common to all employees as well as specific terms and conditions concerning
information security appropriate to the nature and extent of access they will have to the
entity’s information assets.
The entity should ensure that employees, contractors and third-party user’s acceptance of
terms and conditions concerning information security is signed and available during audit.
Where appropriate, responsibilities contained within the terms and conditions of employment
should continue for a defined period after the end of the employment.
Page 87 of 192
E. Disciplinary actions to be taken if the employee, contractor or third-party user violates the
entity’s information security requirements
HR 3 During Employment
It is an entity management responsibility to ensure new staff are properly briefed on their
information security roles and responsibilities. The employee should be made to sign the
entity’s Acceptable Usage Policy prior to being granted access to entity information assets.
When assigning access to information assets, the entity should always consider separation of
duties to avoid potential conflict of interest or misuse of position.
With cybersecurity as with healthcare, prevention is better than cure. Increasing staff
awareness about secure handling of information assets will prevent a majority of information
security incidents and change the entity’s security posture from reactive to proactive.
Awareness training can take different forms depending on the size and structure of the entity.
It is critical that the material used is relevant and up to date. Innovative methods and incentives
can help improve staff participation.
The Department of Health will also contribute to the entity’s efforts by providing email tips,
posters etc. All entity staff subject to Department of Health licensing procedures will in the
future also have to undergo Cybersecurity e-learning as part of their CE / CME / CPD process.
Notwithstanding the support from the Department of Health, it is the entity’s management’s
responsibility to ensure staff achieve a level of awareness on security relevant to their roles and
responsibilities within the entity and are also motivated to fulfill the security policies of the
entity. The training should be to an annual schedule and a record of awareness training
provided should be maintained.
Due to the fast digitalization in the field of healthcare there is a situation where the most
experienced medical professional may have the least experience with computers and other
electronic equipment. This can lead to security and accuracy issues. Security maybe
compromised if usernames and passwords are shared with junior staff to help with data entry.
On the other hand, wrong data could be entered due to unfamiliarity with the software /
keyboard / mouse.
Page 88 of 192
Another example can be staff responsible for entity IT and IT security becoming a security weak
point if they have not been provided training to keep up with the changing technologies they
manage.
These skill and competency gaps have to be identified and addressed by providing training and
competency development programs. Such gaps can be identified by a risk assessment followed
by appropriate remediation.
Cybersecurity has a similarity to healthcare, in that prevention is better than cure. Increasing
staff awareness about secure handling of information assets will prevent a majority of
information security incidents and change the entity security posture from reactive to
proactive.
Awareness training can take different forms depending on the size and structure of the entity.
It is critical that the material used is relevant and up to date. Innovative methods and incentives
can help improve staff participation.
The Department of Health will also contribute to the entity’s efforts by providing email tips,
posters etc. Entity staff subject to Department of Health licensing procedures will in the future
also have to undergo Cybersecurity e-learning as part of their CE / CME / CPD process.
Notwithstanding the support from the Department of Health, it is entity management’s
responsibility to ensure staff achieve a level of awareness on security relevant to their roles and
responsibilities within the entity and are also motivated to fulfill the security policies of the
entity. The training should be to an annual schedule and a record of awareness training
provided should be maintained.
A disciplinary process is needed as part of the enforcement of human resources security. After
verifying the security incident and identifying the employee responsible, a graduated response
based on the risk exposure and employee history is recommended. Breaches can be intentional
or accidental and the two should be treated differently.
An incident resulting in loss or leakage of health data should be considered a critical incident
and may render the employee liable for instant dismissal. Such incidents may come under the
purview of Federal Law No. 2 of 2019 on the use of ICT in healthcare.
A record should be maintained of all security incidents and of actions taken in response by
management.
A common security failure during the employee exit process is the failure to inform all
stakeholders. This can result in physical or logical access being allowed after the exit date.
Page 89 of 192
An internal and external communication protocol on employment exit is required so that all
internal and external stakeholders are informed. Internal stakeholders should be informed
about knowledge transfers and responsibility handovers. External stakeholders like the
Department of Health and the Health Information Exchange, etc. should be informed where
applicable.
Change of contract should be managed as the termination of the current contract or
employment, and the new responsibility should be handled like a new employment.
The scope of this control covers physical and information assets. All issued software and
hardware should be recovered as part of the employee exit process. This process can be
efficiently completed if an asset management system is in place (see AM 2.1).
Possible items include computers, mobile phones, electronic storage media, medical
equipment, access cards, licenses, keys etc. All entity information, especially healthcare related
information should be recovered. If personal equipment was used to store such information,
the data should be transferred to entity equipment and then securely erased from personal
equipment. The handover should also include documentation of operational knowledge
including passwords where applicable.
The confirmation of recovery should be signed off by relevant internal stakeholders and the
departing employee should also confirm in writing that no entity data is in his direct or indirect
control.
Due to the sensitive nature of health information, entities should consider immediate
termination of access rights following resignation, dismissal, etc., or wherever an increased risk
is perceived. In some cases, it may be acceptable to allow restricted access before the final exit.
Such a situation should be carefully evaluated considering the reason for the termination, their
current access and responsibilities.
Written instructions from entity management or authorized staff should be followed for access
termination in all cases.
As part of the termination process, access that should be removed include physical and logical
access. For example, keys, identification cards, information systems, medical equipment,
subscriptions, biometric security systems, as well as removal from any documentation that
identifies them as a current member of the entity. Any common password shared with the
employee should also be changed upon exit; particularly for medical equipment.
Where applicable, the entity should communicate with the Department of Health or Abu Dhabi
government to revoke any relevant system and application access upon termination.
Page 91 of 192
Domain 2 - Asset Management
Asset Management is key to effective healthcare Information Security management. Healthcare
entities are witnessing an influx of new asset classes that are very different from the ones they
are used to dealing with. Innovative care delivery mandates that healthcare entities and
professionals deal with a large number of relatively small, mobile and sophisticated pieces of
equipment/devices, and to keep them running at all times as they are often critical to the
patient’s health, safety and wellbeing. In order to be effective and supportive of organizational
business and security objectives, healthcare entities should maintain an updated version of
asset inventory. The current version should be available to relevant management, business and
support stakeholders.
Information assets includes information/data in all its forms, as well as the underlying
application, technology, and physical infrastructure to support its processing, storing,
communicating and sharing.
The following are considered information assets:
1. Information (in physical and digital forms)
2. Medical device and equipment
3. Applications and Software
4. Information System
5. Physical Infrastructure (Data centre, access barriers, electrical facilities, HVAC systems, etc)
6. Human resources (in support of care delivery)
Asset classification is defined in detail in Section A-5 of the ADHICS standard. Personal and
patient information should always be classified as Confidential.
For visual representation, DoH Standard classification colors and categories should be used:
Red = Secret
Orange = Confidential
Blue = Restricted
Green = Public
Page 92 of 192
AM 1 Asset Management Policy
The Asset Management Policy provides a structure for the management of IT assets (e.g.
people, hardware, software, data, facilities) from procurement to disposal. The policy can, for
example, contain:
A. IT assets classification scheme (DOH Standard)
B. Classified assets security requirements
C. Disciplinary procedure
Additional policy controls for medical devices and equipment are covered in AM 1.2.
Depending on the size and structure of the entity, the Asset Management policy can be
included as part of a single general information security policy document, or can be split up into
multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Asset Management Policy, this domain has the following supporting or
dependent entity policy references:
1) Data Retention and Disposal Policy
2) Physical and Environment Policy
3) Portable Device Security Policy
4) Acceptable Usage Policy
These additional controls specific to medical devices and equipment are to be taken into
account when developing the asset management policy mandated by AM 1.1.
Medical equipment and devices play a crucial role in the treatment and diagnosis of illness and
disease. However, as discussed elsewhere in this document, they also introduce new risks. This
control is intended to help manage the risk associated with the use of medical equipment and
devices. Specific attention to access control, authentication, authorization, handling
procedures, risk log and disposal of medical equipment and devices is required as part of this
control.
Page 93 of 192
This can be included as part of the asset management policy, in a single policy document, or can
be represented by a separate policy reflecting the complex nature of certain entities.
AM 2 Management of Assets
The healthcare entity should have all their information assets identified, recorded and
maintained through an information asset inventory.
The inventory should be updated periodically, or during change in the environment, and should
be accurate and reliable. The inventory can be centralized or distributed based on the entity’s
internal structures. To achieve consistency across the entity, current version of each inventory
should be available to all stakeholders.
A typical list of inventory assets that might be considered include but is not limited to:
IT Assets i.e. Laptops, workstations, storage, servers, security devices (firewall, IDS/IPS,
anti-spam, etc.)
Network assets i.e. Routers, gateways, switches, wireless access points, printers etc.
Staff - Information Technology Director/Manager, Database architect/administrator etc.
Internal applications - Electronic medical records (EMR), Financial control, ERP, CRM,
email etc.
External facing applications - Websites, Mobile Apps, E-commerce, IP addresses, DNS
services, etc.
Data - Customer personal data, customer health data, entity’s employee personal and
financial data
Physical facilities - Hospitals, medical centers, clinics, pharmacies, data centers, etc.
The inventory should establish the relations between various types of information assets, in
support of care delivery;
Every identified asset should be assigned an ‘Owner’. The owner maybe an individual or a
designated role. The purpose is to assign responsibility for the security of the asset.
Page 94 of 192
The responsibility of the ‘Owner’ should be to:
1. Define/identify the control requirements to minimize the impact of risk, due to the
compromise of assets under his/her ownership.
2. Review the adequacy of implemented control measures periodically and amend/modify
the control environment as necessary.
3. Ensure effectiveness of the implemented controls, in addressing the risk environment.
4. Authorize access and/or use of information assets.
Note that the patient is the final owner of his/her personal health information and ‘Owner’
designated by the healthcare entity acts on behalf him/her.
Ownership of shared IT resources (email system, Active Directory, Common File Server, etc.)
should be collectively owned by the entity’s Information Technology/System or Information
and Communication Technology Function.
The healthcare entity should establish and enforce rules on the acceptable use of information
assets. The Human Resources Security domain has related information under HR 2.2, HR 3.1
and HR 3.2.
1. The rules should be communicated to all employees and contractors in support of care
delivery, and should be read and acknowledged by all.
2. Entities should maintain records of user acceptance on the acceptable use of information
assets.
The rule should consider general requirements and industry best practices and should have
management requirements to reduce probabilities of information leakage/loss/theft and
system compromises.
Entity management should be aware of emerging cyber risks, and should address risk due to
the exploitation of the concept-in-practice “Bring Your Own Device (BYOD)”. While BYOD is
considered user friendly and cost effective, use of personal devices introduces a major risk. The
range of devices with different operating systems and applications means that entity data is
exposed to various vulnerabilities.
Page 95 of 192
1. Probabilities of compromise through the use of personal devices should be addressed
through suitable rules and role-based usage agreements.
2. Authorization to use personal devices to access/view/use/share/process/store personal
health information is subject to user acknowledgement on the usage agreements.
Control process and technology solution should be implemented to reduce/address/contain
factors of risk.
The healthcare entity should classify all information assets, that categorizes information assets
into one of the following Department of Health classification schemes:
Red = Secret
Orange = Confidential
Blue = Restricted
Green = Public
The Department of Health standard colors for classification used for visual representation as
given above. See also Section A-5 of the ADHICS standard as well as the Information Asset
Management policy in the Baseline policies in Section 3 of this document.
In addition to the traditional classification of health data based on its sensitivity to disclosure,
the criticality of information also needs to be classified, i.e. the extent to which the availability
and integrity of the information are essential for the ongoing provision of healthcare. Time
factors involved in the treatment processes often play a crucial role in determining the
availability requirements for personal health information. Classification in respect of
confidentiality, availability and integrity should also be applied to IT equipment, software,
locations and staff. The requirements of protection for information assets in healthcare is
unique and should not be compared with standard government or military data classification
systems.
Criticality of information assets should be identified through a risk assessment tool/exercise.
See ADHICS Section A-4, Risk Management.
Classification is the responsibility of the designated ‘Owners’ of information assets. The scheme
should be consistent across the whole entity so that everyone will classify information and
related assets in the same way, have a common understanding of protection requirements and
apply the appropriate protection.
Page 96 of 192
AM 3.2 Value of Information during Classification [T]
Information classification should consider value of the information and should be more
restrictive/deterrent based on the entity’s tolerance of financial impact due to compromise of
the information considered.
The entity should consider the immediate financial impact as well as the costs of any regulatory
or legal penalties.
The level of essential protection needed for an asset should be considered while determining
asset classification. The classification should be done consistently.
Results of classification should indicate value of assets depending on their sensitivity and
criticality to the entity, e.g. in terms of confidentiality, integrity, and availability. The designated
‘Owner’ should evaluate each item to decide its classification. Besides the financial impact a key
criteria can be the presence of personal health information.
The healthcare entity should establish process to reassess and/or change information
classification, based on the following:
1. Change in the value of information
2. Changes to environment (location, access, storage, processing, usage, etc.)
3. Changes in protection levels
Asset classification should be updated in accordance with changes of their value, sensitivity,
and criticality through their life cycle.
The healthcare entity should establish process to interpret classification schemes, while
receiving information from other entities/3rd parties and should apply all essential control
measures to safeguard/protect against compromise.
The Department of Health has mandated a common classification scheme for the Abu Dhabi
healthcare sector. The ADHICS standard also mandates visible and digital indications of the
current classification. This will simplify the sharing of data without risking its security.
Automated classification software is available where carefully chosen parameters like keywords
allow the software to analyze a document or email and recommend the right template. This is
possible for data already on storage as well as documents being generated. The software could
force classification of documents while saving or emails when the send button is clicked.
The healthcare entity should establish process to label its information assets in all its form
(physical & digital) in a way that is consistent with its classification scheme.
Procedures for information labeling should cover information and its related assets in physical
and electronic formats. The labeling should reflect the classification scheme in which it is
established. The labels should be easily recognizable. The procedures should give guidance
where and how labels are attached in consideration of how the information is accessed or the
assets are handled depending on the types of media. The procedures can define cases where
labeling is omitted, e.g. labeling of non-confidential information to reduce workloads.
Employees and external party users should be made aware of labeling procedures.
Department of Health standard colors for classification should be used such as:
Red = Secret
Orange = Confidential
Blue = Restricted
Green = Public
Output from systems containing information that is classified as being confidential or secret
should carry an appropriate classification label in the output. Since all personal health
information is classified as confidential, output from medical equipment and devices should be
labeled as such at the output.
AM 4 Asset Handling
Page 98 of 192
Handling procedures should be defined for information, consistent with their classification.
Keep distribution to a minimum as required for entity operations. All media should be clearly
marked with the intended recipient. Care should be taken that he classification scheme used
within the entity may not be equivalent to the schemes used by other entities, even if the
names are similar; in addition, information moving between entities may vary in classification
depending on its context in each entity, even if their classification schemes are identical.
Ensure adoption and application of handling procedures while handling information. Following
defined procedures will ensure that handling, processing, storing, and communication of
information is consistent with its classification. Any temporary or permanent copies of
information should be protected to a level consistent with the protection of the original
information
The healthcare entity should manage removable media in accordance with the classification
scheme, handling procedures and acceptable use of assets.
Removable media can be a source of data leakage and its use must be discouraged at all times.
Encryption of data should be considered.
Page 99 of 192
Access and usage of removable media should be controlled and should be based on the entity’s
management approval.
The healthcare entity should establish medical devices and equipment management
procedures for each category of identified medical devices and equipment. The procedures
should include handling of personal health information on the device where applicable. Secure
operation and storage of the devices or equipment should be covered.
Access and privilege allocation for medical devices should be provided to defined roles, with
essential qualification and experience required to operate. Medical equipment and devices
should be protected from unauthorized operation. Where available, access should be restricted
with passwords following the entity password policy.
The healthcare entity should prevent unauthorized disclosure, modification, destruction or loss
of patient health information stored on medical devices and equipment.
Entities should ensure that:
1. Information stored within the medical devices and equipment should be encrypted
2. Electronic communication between medical devices and equipment is encrypted
3. Healthcare entities define the minimum essential qualification required to operate and/or
handle medical devices and equipment
4. Copies of valuable health data are moved to a secure storage/location to reduce the risk of
its data damage or loss.
Use of wireless networking introduces the possibility of Denial of Service (DoS) attacks as well
as Man in the Middle (MitM) attacks which can affect the availability and confidentiality of data
on the internal network. This is especially critical for medical devices and equipment. See also
CM 5.4. If wireless networks are used, then the strongest available authentication and
encryption should be used. Connections should be logged, monitored and restricted to trusted
devices.
Entity should deploy technology solution to white list removable media, and should be
complemented by content encryption and biometric based access provisioning. The entity
should always consider the data leakage risks from removable media.
The healthcare entity should establish control procedures for the removal, movement, and
transfer of information assets (information, equipment, medical devices, and information
processing equipment/systems).
Healthcare entities should:;
1. Authorize removal, movement and transfer of information assets. Equipment, information,
or software should not be taken off-site without prior authorization
2. Maintain records of removal, movement and transfer for audit purposes.
AM 5 Asset Disposal
The healthcare entity should dispose of information assets, when no longer required:
• by the entity
• on basis of regulatory demands or
• for legal proceedings
The retention demands of various healthcare laws and regulations should be followed before
physical or digital data is disposed.
The healthcare entity should establish a control process that ensures data once destroyed is not
recovered.
Due to the sensitivity of personal health information it is recommended that media containing
entity data be physically destroyed. Reuse of digital media for entity internal use maybe
acceptable provide military grade wiping tools have been used to wipe the media.
Media, both digital and physical, when no longer required should be destroyed by the entity.
The healthcare entity should establish control procedures for the secure disposal or reuse of
media, equipment, devices and systems, containing classified information.
The healthcare entity should:
1. Ensure sensitive data and licensed software has been securely removed beyond recovery,
prior to disposal
All disposal requirements should be authorized by entity management prior to disposal. Formal
procedures for the secure disposal of media should be established to minimize the risk of
confidential information leakage to unauthorized persons. In the context of a healthcare entity
all media for disposal should be treated as confidential. Destruction of media by a third party
should be supervised and the third party should issue a certificate of destruction.
The healthcare entity should maintain records, on media disposal. The records should be
available for audit purposes for a period defined by the retention policy. Appropriate controls
should be implemented to protect records and information from loss, destruction, and
falsification.
The records should have, but not be limited to, the following fields:
• Information and/or asset owner
• Type of media
• Classification
• Disposal type
• Reason for disposal
• Retention expiry date (if data)
• Data removal confirmation and evidence
• Disposal authorized by
The healthcare entity should develop, implement and maintain a physical and environmental
security policy, to ensure adequate physical and environmental protection of entities
information assets.
The policy should:
1. Be relevant and appropriate for entities operational and risk environment, concerning
internal and external threats
2. Address requirements of secure storage of hazardous or combustible materials that ensures
avoidance of:
• human injuries or loss of life
Additionally, the controls specified in PE 1.3 for Medical equipment should also be taken into
account while defining this policy.
Depending on the size and structure of the entity, the Physical and Environmental Security
policy can be included as part of a single general Information Security Policy document, or can
be split up into multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Physical and Environmental Security Policy, this domain has the following
supporting or dependent entity policy references:
1) Clear Desk and Clear Screen Policy
PE 1.2 Procedures and Guidelines for Physical and Environmental Security Policy [T]
In addition to the Physical and Environmental Security Policy, healthcare entities classified as
transitional or advanced should develop, document, and implement matching procedures and
guidelines.
The procedures should facilitate the implementation of the physical and environmental security
policy and associated physical and environmental protection controls.
The entity should also ensure that the physical and environmental security policy and all
supporting procedures and guidelines are periodically reviewed and updated.
Safety of patients and staff as well as protection of personal health information should be the
key criteria for these procedures and guidelines.
The following sample guidelines can be considered to avoid damage from fire, flood,
earthquake, explosion, civil unrest, and other forms of natural or man-made disaster:
A. Hazardous or combustible materials should be stored at a safe distance from a secure area.
Bulk supplies such as stationery should not be stored within a secure area
B. Fallback equipment and backup media should be sited at a safe distance to avoid damage
from a disaster affecting the main site
C. Appropriate permanent and portable firefighting equipment should be provided and suitably
placed
In addition to normal physical and environment items the Physical and Environmental Policy of
a healthcare entity should consider specific needs of medical equipment and devices.
Placement and physical access should take into account hazards of certain medical equipment
like radiation, strong magnetic fields as well as bio-hazards.
The physical and environmental policy should address processing of personal health
information should require any workstations with access to such information to be situated in a
way that prevents unintended viewing or access by subjects of care and the public.
PE 2 Secure Areas
The healthcare entity should define and use security perimeters to protect facilities that
contain information and information systems. Particular attention should be provided for
personal health information.
3. Secure areas where medical equipment and devices are installed or used should be protected
to avoid and minimize probabilities of unauthorized access and usage. Physical barriers should,
where applicable, be built to prevent unauthorized physical access and environmental
contamination. The entity should always ensure that the security measures are selected in a
way that ensures security without compromising efficient healthcare delivery.
4. The entity should consider the impact of compromise of confidentiality, integrity and
availability of information or information assets while applying security counter measures. The
measures undertaken should be proportionate to the risk and impact identified.
5. Information systems managed by the entity should preferably be physically separated from
those managed by third parties.
Discussion of patient information in public areas like corridors, elevators etc. should be
avoided. Secure private areas to discuss personal health information between authorized
stakeholders and/or patients can ensure confidentiality and privacy. This requirement is for
entities classified as Advanced only.
The areas should be unobtrusive and give minimum indication of their purpose. The rooms
should be soundproof. Relevant health and safety regulations and standards are applicable.
Secure areas involved in information processing and personal health information should be
protected by appropriate control measures to ensure only authorized personnel are provided
access and authorized activities are being conducted. The recommended controls to achieve
this are listed below.
Ensure that all employees and contractors wear distinguished form of visible
identification (Badge/ID cards) within the premises of the entity. This will improve
awareness and identification.
Ensure the locking mechanisms on all access doors are adequate, and alarms configured
to alert prolonged open-state of doors. Monitoring normally closed doors being kept
open can identify unauthorized access.
Escort contractors or third parties while inside the secure areas. Contractors or third
parties should not be allowed to work unsupervised in secure areas.
Preserve CCTV footage for a period as required by Monitoring and Control Centre (MCC)
Abu Dhabi. The Monitoring and Control Centre (MCC) Abu Dhabi has detailed
requirements regarding CCTV coverage of facilities. Compliance to the Monitoring and
Control Centre (MCC) Abu Dhabi requirements is mandatory.
Each Secure area should have a designated ‘Owner’ who is responsible for monitoring the
security of that area.
Offices, meeting rooms and facilities in support of healthcare service delivery should be
equipped with adequate physical security measures.
The entity should avoid obvious signs that indicates the type of information or activities in the
secure areas if it is area that may handle sensitive information.
The healthcare entity should ensure that fall-back equipment, device, system and backup media
are protected from damage caused by natural or man-made disasters.
Generators and battery power backup should be available to provide power to key information
systems and critical data centre infrastructures.
The entity should consider also the external environment like fire in a neighboring building,
water leaks etc.
The healthcare entity should ensure that physical and environmental protection
countermeasures and procedures applied are aligned with the outcome of the Risk Assessment
and regulatory mandates.
The primary responsibility of safe healthcare delivery must be achieved to the extent possible.
The healthcare entity should design physical protection guidelines for working in secure areas.
The guidelines should cover:
Activities in secure areas. Unsupervised working in secure areas is not allowed for safety
and information security reasons.
Control access of mobile, portable and surveillance devices/equipment/utilities, to
secure areas. Any device that can be used to carry out data should be controlled.
Page 109 of 192
USB devices used by third parties for maintenance tasks like firmware updates should be
checked prior to being allowed to connect.
All personnel including third parties should be educated not to discuss personal health
information in public areas.
Unsupervised working in secure areas should be avoided both for safety reasons and to prevent
opportunities for malicious activities.
Segregation of delivery and loading areas is a best practice to ensure control over incoming and
outgoing materials. The method of implementation will depend on the size of the entity and
the volume of materials handled.
Ideally, the external doors of a delivery and loading area should be secured when the internal
doors are opened to prevent unauthorized access. All material should be inspected within this
area and registered in accordance with healthcare entity’s asset management procedures.
Access procedures for loading and unloading areas should be defined to restrict access only to
authorized personnel.
PE 3 Equipment Security
PE 3.1 Equipment Siting and Protection
The healthcare entity should site/position equipment and medical devices in manner that they
are always protected.
Guidelines on physical protection and unauthorized access of equipment and medical devices
should be established. When positioning equipment and medical devices, care should be taken
to avoid the possibility of their exposure to high temperatures and humidity. Similarly, the
entity should avoid placing critical equipment close to glass windows to avoid the risk from
external incidents.
Equipment handling personal health information with insufficient access control should be sited
in a lockable area.
For example:
Power and communications lines into information systems should be protected with no
cables exposed to human traffic.
Power cables should be segregated from communications cables to prevent
interference
There should be controlled access to patch panels, cable rooms, circuit breakers to
prevent accidental or intentional misuse;
Where applicable, electromagnetic shielding should be used to protect cables from
interference;
Scheduled physical inspections to identify deviations as well as unauthorized devices
being attached to the cables;
Provision for UPS and/or power generator where applicable taking into account power
load as well as expected runtime.
The healthcare entity should maintain supporting equipment, to ensure their continued
availability. This control is applicable to facilities classified as Advanced. The entity should:
Establish maintenance schedule of supporting utilities, and maintain up-to date records
for maintenance carried out. Supporting utilities include electricity,
telecommunications, water supply, natural gas, sewage, heating, ventilation and air
conditioning.
The entity should ensure controlled access to patch panels, cable rooms, and circuit
breakers to prevent accidental or intentional misuse
The entity should use electromagnetic shielding to protect cables from interference
where applicable and should use fibre optic cables for data in areas with high
electromagnetic radiation.
The entity should schedule physical inspections to identify deviations as well as
unauthorized devices being attached to the cables
See also CM 5.
A healthcare entity’s equipment, medical devices and information processing systems may be
taken off-site for storage, maintenance or for remote working. Management should authorize
taking equipment outside the entity’s premises in any case.
In all situations, the healthcare entity should ensure security measures are applied to protect
off-site equipment, medical devices and information processing systems from the probabilities
of information leakage, tampering and unauthorized activities.
In the case of storage or maintenance, the entity should ensure that no personal health
information is allowed to go off-site on the equipment. This is also applicable in case leased
equipment is being returned to a supplier.
The entity should ensure that the manufacturer’s recommendation and instructions are
followed, while equipment, medical devices and information processing systems are off-site,
particularly the environmental conditions.
Movement and possession (chain of custody) logs for off-site equipment, medical devices and
information processing systems should be maintained and verified, even if the possession goes
outside the entity.
Misuse of unattended systems and equipment introduces a major risk of information leakage
and unauthorized activities. This is applicable to IT as well as to medical equipment and devices.
Establishing procedures regarding leaving equipment, medical devices and information
processing systems unattended is mandated by ADIHCS Standard. In line with this:
All users should be made aware of these security requirements and their personal
responsibility to information security.
Users should logoff before leaving equipment;
Automatic logoff after a preset idle time should be implemented wherever supported by
the equipment; and
Equipment without such functionality could be protected by locking the room or the
area.
Information left visible on the screen or paper documents left unattended on the desk etc. form
another method of information leakage. Similarly, removable storage drives if allowed and
when left unattended are also another source of data leakage.
If managed printing is not implemented by the entity, uncollected printouts left at the printer
can be another source of information leakage as can be photocopiers. As such:
A healthcare entity’s ability to provide authorized access and its commitment to control
unauthorized access to information and information processing systems under its custody are
key elements to demonstrate the entities’ objective interest to protect information that
belongs to:
Its customers,
Patients of the Abu Dhabi healthcare ecosystem,
The Government, and
The healthcare entities themselves.
The influence of information on the delivery of healthcare and related services and the
increased dependence on application and technology, demands that the avenues and
provisions of access are strictly controlled. It is essential that healthcare entities understand the
responsibilities concerning access management and are accountable for the consequences
arising from breaches or disclosures from their respective areas of authority.
Healthcare entities should define policy mandates and process mechanisms essential to secure
and protect their information and information systems. Healthcare entities should take specific
care when personal health information is being accessed or used and should define access
criteria that conforms to the following facts:
A healthcare relationship exists between the user and the data subject (the subject of care
whose personal health information is being accessed),
The user is carrying out an activity on behalf of the data subject,
There is a need for specific data to support care delivery or continuum of care.
The healthcare entity’s management should be aware of the risk environment and outcomes of
unauthorized access, as it will be accountable for all consequences and impacts on:
The healthcare entity should develop, enforce and maintain an access control policy to ensure
access to information and information systems are adequately controlled and secured.
The access control policy should consider all personal health information as confidential. While
the importance of particular data may vary over time for each patient, the healthcare facility
and their staff should treat all personal health information as confidential at all times.
The access control policy should take into account the risks of working with mobile computing
equipment in unprotected environments. The mobile related requirements should include
physical protection, access controls, cryptographic techniques, backups, and virus protection.
Management along with designated asset ‘Owners’ should determine appropriate access rules
and restrictions for specific user roles towards their assets. Users should have clarity on the
information security requirements to be met by access controls.
When using mobile devices, e.g. notebooks, palmtops, laptops, smart cards, and mobile
phones, special care should be taken to ensure that entity information is not compromised.
This policy should also include rules and advice on connecting mobile devices to networks and
guidance on the use of these facilities in public places.
Depending on the size and structure of the entity, the Access Control policy can be included as
part of a single general information security policy document, or can be split up into multiple
policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Unique user accounts are mandatory except in equipment that do not support multiple user
accounts. It is best practice not to reuse a user’s ID even after the user leaves the organization.
This is to ensure a departed user’s activity can be traced if required.
A shared or group account should not be provided to users. Role-based access control can be
implemented using groups and adding individual users to the groups as per approval. In this
way the group memberships of a user will determine his access to systems in a controlled and
auditable manner. Any deviation from this should be authorized and documented.
Credential sharing between staff should not be allowed. This has to be part of awareness
training. Timely provision of required access to users will reduce the likelihood of credential
sharing. It should not be acceptable for a new employee to be allowed temporary system
access using another employee’s credentials while their own credentials are being setup. This is
a major violation and can have serious repercussions for the entity’s information security. The
Page 116 of 192
right way to onboard a new employee quickly is to have a clear process in place between HR, IT
and any other concerned department to optimize the workflow for onboarding employees. The
entity should avoid incomplete data at each stage, whether personal information or access
requirements to prevent delays in the process. A sample form is available in Section 5 – Forms.
If temporary or third party workers have to be provided access, the same requirement of
unique user account per user should be met. Additionally, an expiry date for the account is
mandatory. The expiry date may be set based on the work requirement or contract duration. If
no date is defined, then a default validity of 90 days can be used.
For all categories of users, the access granted to information systems and medical systems
should be based on documented approval of the system’s ‘Owner’. Please refer to AM 2.2 of
the Domain 2, Asset Management. Additionally, the entity’s management approval may also be
required in particular situations.
The employee Exit and Role Change Processes are covered in detail in Domain 1, Human
Resources Security. Please refer to HR 4.1 to 4.4 for the relevant guidelines
The effective implementation of the above requires an up to date auditable record of persons
authorized to use healthcare entity’s information systems, applications, medical devices and
equipment. Identifying and disabling or deleting inactive accounts should also be conducted on
a quarterly basis as part of housekeeping.
The healthcare entity should restrict and control allocation of privileges, based on principles of
need to know.
It is a common mistake that normal user accounts are given enhanced rights to run as service
accounts or to conduct system level activities. Even if the user is authorized for these
privileges, separate administrative accounts should be used for these activities to reduce the
risk if the normal user account is compromised, for example by a phishing attack.
The healthcare entity should establish process for secure allocation, use and management of
security credentials.
Default passwords are not to be used any context. All default passwords are to be changed
before an application or system is put in use. Listings of default passwords are available on the
internet and so provide no security at all.
Passwords should be stored encrypted. Plain text storage of passwords may expose entity to
insider attacks as well as external. When a Username / password needs to be communicated to
a user, it is not possible to encrypt the information. Therefore, the two should be sent in two
different communications.
Password complexity and password history – minimum current best practices are eight
characters including one number, one upper-case and lower-case character, and a special
character. Reusing the last three passwords should not be allowed.
User awareness training should educate users on selecting strong passwords that are easy to
remember but difficult to guess. The entity can consider opting for alternative methods of
authentication like Biometrics to improve access speeds in areas of critical healthcare delivery.
Users should be educated not to write down their passwords and not to utilize the password
used on corporate systems for their personal accounts and vice versa. In the absence of Single
Sign On, it is acceptable for a user to use the same strong password across multiple corporate
systems.
The healthcare entity should protect confidential and secret information on portable or
removable media, mobile or portable devices, and medical equipment or devices.
Mobile devices with sensitive information should be managed with a mobile device
management (MDM) solution which can enforce encryption as well as device wipe in case of
loss.
AC 3.2 Access Control for Assets and Equipment in Teleworking Sites [T]
The healthcare entity should control access to equipment, devices, system and facilities at
teleworking sites.
Teleworking introduces a set of information security risks which have to be mitigated by the
entity. Physical security at the teleworking site should be assured to protect the teleworking
equipment as well as possible misuse of the connectivity to corporate networks. External access
to resources can also be made more restricted, only allowing access to required resources.
Authentication should be required for all remote equipment. Access should be only for
authorized users.
The entity should ensure confidentiality and protection of information during the transmission
of personal health information. Random audits should be conducted of the equipment and
facilities at the teleworking sites. The entity should maintain an up to date asset inventory for
teleworking sites with designated ‘Owners’ taking responsibility of the equipment even when
not in use.
Users should be made aware of the risks of equipment and data loss. Up to date anti-malware
software should be present. The communications link should use the current best practice
encryption protocols. Virtual desktop solutions can be considered to minimize data leakage.
AC 4 Access Reviews
AC 4.1 Review of User Access Rights
The healthcare entity should review access and privileges granted to its user.
Access reviews should be conducted every three months for critical systems and at least once a
year for others. The designated ‘Owner’ of the resource will confirm whether to discontinue or
continue a particular user’s access.
The healthcare entity should use appropriate authentication methods to control access by
remote users. Remote access to a healthcare facility’s systems should be provided only in
specific cases and should be provided after management approval.
The entity should ensure that only authorized devices are connected to its network. The
controls used will depend on the size of the entity. Network Access Control (NAC) equipment
can be used in larger entities whereas physical control could be used in small entities.
It may be necessary to consider physical protection of the equipment to maintain the security
of the equipment.
The healthcare entity should control access for the purpose of diagnostic and configuration.
Medical equipment, computer systems, network systems, communication systems etc. may
have a remote diagnostic and configuration port for use by maintenance engineers. If
unprotected, these diagnostic ports provide a means of unauthorized access. Connectivity to
these ports should be enabled only when required and with authorization.
User access to shared and isolated networks should be restricted. Using segregated networks
allows granular control over access to different parts of the network. The connectivity allowed
should be to areas relevant to the role of the user. Connection control can also be used to
restrict traffic from individual users to the internet. Segregation of networks limits lateral
movement of malware if an endpoint is compromised. Medical equipment known to be using
unsupported versions should be segregated to ensure that there is no lateral movement of
malware in case it is compromised.
The healthcare entity should define and implement network routing controls to
ensure information flow and system, devices, equipment connections are not
compromised and are in line with requirements of Access Control Policy.
Implementing routing control adds a layer of protection to entity network traffic. All
traffic from an endpoint can be routed as required. This will reduce the lateral
movement of malware if an endpoint is compromised.
Traffic from/to the DMZ should also use routing control.
The healthcare entity shall ensure wireless access within the entity is secured. See also CM 5.4
Use of wireless connectivity to internal networks is not recommended. If imperative, then
wireless controller based access using verified endpoints and entity’s internal authentication
scheme can be used. Privileged and administrative accounts should not be used over Wi-Fi.
Disable Bluetooth, Wi-Fi and other wireless technologies on medical equipment and devices
unless it is being used.
The healthcare entity should establish and enforce secure log-on and log-off procedures to
control access to system and applications.
The healthcare entity should create unique identifier (user ID) for each users who require
access to entities systems, applications or services, and should implement a suitable
authentication technique.
Unique user accounts are mandatory except in equipment that do not support multiple user
accounts. It is best practice not to reuse a user id even after the user leaves the organization.
This is to ensure a departed user’s activity can be traced if required.
A shared or group account should not be provided to users. Role based access control can be
implemented using groups and adding individual users to the groups as per approval. In this
way the group memberships of a user will determine his access to systems in a controlled and
auditable manner. Any deviation from this should be authorized and documented.
Page 123 of 192
See also AC 2.1
The healthcare entity should restrict and control the use of utility programs and tools that
might be capable of overriding system and application controls.
Most such utilities do not have logging functionality and this is another reason to block access.
A particular case is Windows Powershell where the Powershell 5 supports logging. It is
recommended to uninstall earlier versions and allow restricted access Powershell 5 to
administrator users only.
The healthcare entity should restrict access to information and application system functions in
accordance with the access control policy.
Access to information and application access should be restricted and based on need-to-know
principles and appropriate authorization. Staff that are not involved in healthcare delivery to
the patient should not have access to healthcare data. Eg. Cleaning staff.
Role based access control will allow access based on responsibilities without creating undue
delay in healthcare delivery.
The healthcare entity should implement controls and should not expose non-public information
to the general public.
Any entity information that is published, for example, through websites or mobile application
must have prior management approval. The process to be followed before information is made
public should be documented. Information should be sanitized to remove any personal health
information.
The objectivity of providing healthcare services should consider security and safety of assets
(data, technology, and application) in support of service delivery and healthcare entities should
demonstrate commitment in defining and controlling of operational activities concerning
service delivery.
The objectives of this domain’s controls are:
To ensure that activities concerning support and maintenance of data, technology, and
application are controlled and carried out in a standardized manner to reduce probabilities of
errors and compromises, and to increase efficiency and security.
Depending on the size and structure of the entity, the Operations Management policy can be
included as part of a single general information security policy document, or can be split up into
multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Operations Management Policy, this domain has the following
supporting or dependent entity policy references:
1) Change Management Policy
2) Capacity Management Policy
3) System Acceptance Policy
4) Quality Management Policy
5) Backup Policy
6) Monitoring Policy
OM 2 Operational Procedures
OM 2.1 Baseline Configuration [T]
The healthcare entity should develop and enforce baseline and recommended configuration
settings for common information technology products and applications, medical devices and
equipment.
The healthcare entity, while developing baseline and recommended configuration setting,
should consider:
1. Manufacturer’s security recommendations – Default settings will prioritize ease of use over
security. The entity should evaluate configurations from the perspective of securing all devices
and equipment.
2. Requirements of this Standard – Any setting which conflicts with the ADHICS standard should
be changed e.g. Cloud connectivity. Any deviations should be approved and documented.
3. Industry best practices – A good starting point for common information technology products
and applications is the Center for Internet Security (CIS) Benchmarks which is a free and globally
accepted resource.
4. Risk mitigation strategies – Based on risks identified in the risk assessment.
5. Corrective and preventive actions – Mitigations based on audit, assessment and incident
outcomes.
The Change Advisory Board (CAB) should have business and operations representatives. A
record has to be kept of all decisions taken. All affected stakeholders should be informed once a
change is approved. Roll back plan should also be communicated.
The Change Advisory Board (CAB) should have business and operations representatives. A
record should be kept of all decisions taken. All affected stakeholders should be informed once
a change is approved. Roll back plan should also be communicated.
The Change Advisory Board must approve the move from test/development to production. See
OM 2.3. A rollback plan must be in place.
The level of separation between operational, test, and development environments that is
necessary to prevent operational problems should be identified and appropriate controls
implemented. No personal health information from production systems must be used in test
systems. The change management process should be followed.
The healthcare entity should identify and document current and future capacity requirements
while planning for new information systems and applications.
New implementations should consider the technical possibilities for upgrading system
resources including availability of parts during the lifetime of the system.
Monitoring and measuring the capacity of information systems is critical to ensure availability
of healthcare delivery. Systems running low on resources like processing power, storage,
memory or bandwidth will be slow and unreliable. Monitoring trends and having defined
capacity thresholds is recommended to ensure capacity demands are addressed proactively.
Long delivery and implementation times should also be taken into account.
Another side of capacity management is recovering inefficiently used capacity. This includes
decommissioning of unused systems, database optimisation and data archiving.
Page 129 of 192
OM 3.2 System Acceptance and Testing [T]
The healthcare entity should establish acceptance criteria for new information systems and
applications, changes, upgrades and releases, in addition to satisfactory test results
The evaluation should include a review of the information security of the new system as well as
its impact on the overall security of the entity’s information systems.
OM 4 Malware Protection
User awareness training along with anti-virus and anti-malware on all endpoints are basic
security requirements. Centrally managing endpoint security will allow administrators to ensure
endpoints are up to date and keep track of detections at the endpoint.
Best practice for end points is to have real time scanning enabled and immediate scan when
removable media is inserted.
The healthcare entity should deploy gateway level protection mechanisms to detect and defend
against malware and viruses
Email and Browser based attacks are currently the most common methods used to compromise
endpoints. All such traffic should be scanned for malware and phishing attacks. Doing it at the
gateway level gives protection before the attack reaches the endpoint as well as a central view
of incoming and outgoing traffic. The gateway can block malicious sites as well as prohibited
sites. For example, this functionality can be leveraged for a data leakage prevention
functionality to block cloud based storage like Dropbox etc.
The healthcare entity should maintain backup copies of essential information and software
needed to support care deliver and its operations
Backups are a basic requirement for a business. The sizing and technology chosen should be
based on the entity data volume as well as the restore point and time requirements. Encryption
of backup data should be considered for offsite storage.
The healthcare entity should establish data archival requirements that satisfies entities
retention demands
Archiving demands are based on the regulations and laws covering the
Monitoring standard activities to build a normal pattern of activity will help identify a variation
which needs to be investigated.
A Security information and event management (SIEM) system can collect and aggregate log
data generated throughout the organization's technology infrastructure, from host systems and
applications to network and security devices such as firewalls and antivirus filters. The software
then identifies and categorizes incidents and events, as well as analyzes them
A secure centralized log management system will help with system utilization and performance
trends, tracking deviations from entity policy and procedures, access control variances and
violations as well as any potential sign of security breach or attack.
A Security information and event management (SIEM) system can collect and aggregate log
data generated throughout the organization's technology infrastructure, from host systems and
applications to network and security devices such as firewalls and antivirus filters. The software
then identifies and categorizes incidents and events, as well as analyzes them.
Log retention period and archiving where applicable should be defined. The storage capacity
requirements should be taken into account. Maximum integrity of the logs can be achieved if it
is not managed by the individuals managing the information systems. (Segregation of roles and
responsibilities).
The healthcare entity should preserve logs in a centralized log management system
The healthcare entity should:
1. Control access to the centralized log management solution
2. Ensure the centralized log management solution is managed by individuals who do not have
Page 133 of 192
operational role in implementing or maintain information systems or application
3. Retain logs for a period commensurate with legal, regulatory and entity demands on each
type of log
4. Define use cases and dashboards based on the entity’s needs and industry
recommendations, and should consider:
a. System utilization and performance trends
b. Deviation from entity policy and procedures
c. Access control variances and violations
d. Any potential sign of security breach or attack
Having all system times in sync is important in many situations. From an information security
point of view, correctly tracing the sequence of events requires corelating log data across
systems and synchronized clocks is critical.
The date/time format should also be standardized. Otherwise the timestamp information can
be misunderstood within applications as well as when overwriting or deleting old files.
The clocks of medical devices and equipment should be set the same as that of the connected
systems.
Regularly check that the clocks of all relevant information processing systems are synchronized.
This is required as some device clocks tend to drift with time.
Vulnerabilities are regularly identified in any hardware or software with network connectivity.
These vulnerabilities are then patched with software updates and/or firmware updates.
Patches are given three levels of criticality. Depending on the criticality a deadline for rollout
should be defined. Testing of patches on a small subset is recommended.
The healthcare entity should monitor information processing systems to prevent opportunities
for information leakage
The first step is to instill awareness on users about information security and the necessity to
keep all data secure unless classified as public. Classification of data is also a prerequisite for
successful implementation of DLP.
Information leakage can be over the network, via USB storage devices or hard copies. Print
management solutions help keep track over the printouts generated per user. Access to USB
storage devices can be restricted by different methods. A central DLP software will give
granular control per user. Network data leaks can be over email, cloud based storage etc.
Blocking at firewalls, proxies, DLP software are options to secure this.
This control specifies the requirement of a vulnerability assessment of the entity’s network
infrastructure. This is to be done annually. In case of major changes or addition of a new system
/ application, a fresh scan maybe required.
Due to the sensitivity of the contents of this report it has to be classified as secret and stored
with the highest security. The identified findings and vulnerabilities and the status of mitigation
has to be shared with the entity’s management and the Department of Health, Abu Dhabi’s
health sector regulator. Secure / encrypted methods will be provided by the DOH for uploading
this information.
Periodically follow up on the progress and status of mitigation measures with the appropriate
stakeholders and verify the effectiveness and efficiency of mitigation measures
A third party contractor typically conducts the vulnerability assessment. As part of the
vulnerability assessment a current and complete inventory of assets including network
Page 135 of 192
infrastructure, applications and internet facing devices will be provided to the service provider.
At the end of the vulnerability assessment, the service provider staff will have up to date
information on any weaknesses in the entity infrastructure.
This control specifies the actions required to reduce the security risk introduced by using a third
party contractor for the vulnerability assessment.
The healthcare entity should ensure that assessment data is not available with third parties
engaged to conduct assessments beyond the time of engagement
The healthcare entity should:
1. Ensure that system, network, applications and security related information is shared with
third parties when they are on-site
2. Ensure that all information related to the entity’s system, network, applications and security
infrastructures and environment and assessment outcomes are erased from the involved third
party’s assets and environment after the completion of the assessment activity
3. Ensure that any shared reports are suitably protected through an adequate encryption
mechanism.
Risk environment of the connected world demands that an entity’s management be conscious
of the current risk environment concerning communication and information exchange, and that
it defines proactive measures that should:
Depending on the size and structure of the entity, the Communications policy can be included
as part of a single general information security policy document, or can be split up into multiple
policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Communication Policy, this domain has the following supporting or
dependent entity policy references:
1) Communication & Operation Management Policy
2) Cryptography Policy
3) Network Access Policy
4) Wireless Access Control Policy
5) Cloud Security Policy
The risk of compromise is high when information is being transferred. Formal procedures are
required defining the control measures to mitigate this risk. The procedure should take into
account the classification and value of information. Personal health information should always
be provided the highest levels of protection.
The stakeholders and the authorizations required should be defined. Responsibilities and
sanctions should be defined as part of the procedure.
Using a second communication channel to send the password or decryption key will ensure that
even if one channel is compromised the encrypted data or login credentials are not
compromised. This is a simple method to ensure confidentiality of information.
Accuracy of the data is critical in the context of healthcare delivery where misinterpreted data
can result in a risk to the patient. Secure methods should be used within custom developed
software to transfer information. Using interoperability standards are one way. Transmission
methods should use error detection and fault handling besides encryption.
The healthcare entity should, prior to the beginning of exchange of information and software:
1. Brief and agree with the external parties on all security requirements to be included in the
agreement
2. Include additional control requirements when exchange of information includes:
a. Personal health information (PHI)
b. Personally identifiable information (PII)
3. Clearly define roles and responsibilities of each party to the agreement
4. Establish non-disclosure agreements for all disclosures between the entity and the external
parties
5. Include in the agreements:
a. Definitions of information to be protected
b. Duration of agreement
Page 140 of 192
c. Process for notification of leakage
d. Ownership
e. Right to audit and monitor activities that involve personal health information and personally
identifiable information
Monitoring and audit of the external party may be required to ensure awareness of the security
requirements. The security requirements should also be applied to any sub-contractor used by
the third party.
By default, physical media in transit is at risk of theft, loss or accidental damage. Suitable
mitigation should be done based on the classification of the information on the media.
In the UAE, the high ambient temperatures in the summer can easily damage media during
transportation. Magnetic media can also be damaged by strong electromagnetic fields and
moisture.
Transmission of personal health information should be with the highest safeguards. Patient
consent maybe required.
CM 3 Electronic Commerce
CM 3.1 Security of Electronic Commerce Services [T]
The healthcare entity should protect electronic commerce service and information involved
passing over public and untrusted networks from service compromise and fraudulent activity,
contract dispute, unauthorized disclosure and modification.
Healthcare entities which use websites or mobile applications for ecommerce or online
transactions should identify and implement security measures to protect information online.
Care should be taken that ecommerce data does not reveal personal health information as part
Page 142 of 192
of the billing. If they do, then additional steps to reduce the risk of compromise should be
taken.
Ensure security requirements are agreed and captured in service agreements with electronic
commerce partners. An online presence will be targeted by malicious attackers and all partners
have to ensure the security of their systems as well as the interconnections.
Further to CM 3.1, the online financial transaction itself must be secure. The payment gateway
and the healthcare entity should comply with all applicable laws and regulations. Always enable
any optional security offered by card issuers
Entity information that is published for example through websites or mobile application should
have prior management approval. The process to be followed before information is made
public should be documented. Information should be sanitized to remove any personal health
information.
Entity systems should enforce current industry standard encryption. Older cryptographic
protocols should not be allowed as they can be compromised.
If end-user data is collected during online interaction, the information should be transmitted
and stored securely at all times.
The healthcare entity should ensure that connectivity to information sharing platforms is secure
and controlled.
Connectivity from every healthcare entity to Shafafiya (Medical Insurance) and Malaffi (Abu
Dhabi Health Information Exchange) are mandated by DoH. Maintaining the security of the data
and the connection is a shared responsibility.
All major Cloud service providers are now operating in the UAE. However, their services are
partially or wholly provided out of datacenters outside the UAE. This breaks the basic regulation
that it is not permitted to transfer, store or process healthcare data outside the UAE. This is an
evolving scenario as national cloud solutions may achieve the required levels of confidentiality,
integrity and availability. At the same time global cloud service providers are setting up in-
country cloud services to meet regulatory demands.
The healthcare entity should ensure that access to health information exchange platforms
within the UAE is strictly controlled.
The rollout of Malaffi (Abu Dhabi Health Information Exchange) will introduce a paradigm shift
to healthcare delivery in Abu Dhabi. The awareness and commitment to information security
from the entities being onboarded is critical. The requirements of the DoH Policy on the Abu
Dhabi Health Information Exchange dated November 2018 are comprehensive.
Besides listing and classifying network assets as part of asset management, entity networks and
related infrastructure should be documented. Up to date diagrams should be maintained
showing the interconnections. Documentation should extend to patch panels and network wall
sockets.
The design should take into account the bandwidth demands as well as the value and
classification of the information stored or passing through the segment. Consider network
access control to block unauthorized users on large networks. Internal firewalls between
segments of large entity networks can help maintain security.
Medical imaging systems like the Picture archiving and communication system (PACS) or
security CCTV systems may have very high bandwidth requirements that require a physically
separate network.
The healthcare entity should ensure that all wireless networks are adequately protected.
The use of wireless networking for the entity’s internal network is not recommended. Wireless
internet access can be provided to guests and visitors but the service should be provisioned on
a completely separate network from the entity internal network. This guest network should
have encryption and authentication enabled. Activity on the guest network should be logged.
A wireless network does not have a physical boundary. However, it is recommended to manage
the location and power output of the Wi-Fi access points to ensure minimum leakage outside
the entity premises.
For internal networks wired networks are always the preferred option and wireless networking
should be used only if it is a necessity. Use of wireless networking introduces the possibility of
Denial of Service (DoS) attacks as well as Man in the Middle (MitM) attacks which can affect the
availability and confidentiality of data on the internal network. This is especially critical for
medical devices and equipment. See also AM 4.8. If wireless networks are used, then the
strongest available authentication and encryption should be used. Connections should be
logged, monitored and restricted to trusted devices. Use of unauthorized equipment like
wireless extenders should be blocked. See also AC 5.7 for access restrictions.
With the launch of the Health Information Exchange (Malaffi) in January 2019 each connected
Healthcare entity will have access to historic health information of their patients even if they
were treated at other facilities in the emirate of Abu Dhabi. This functionality also means that
the entity goes through an onboarding process. As part of this process, they have to be
compliant to the information security requirements of the DoH Policy on the Abu Dhabi Health
Information Exchange dated November 2018.
The specific requirements for Malaffi are not part of the scope of this document. The ADHICS
standard sets the overall Health Information and Security baselines for all healthcare entities.
However, it is recommended to go through the policy above even if you are not in the Malaffi
onboarding process yet.
It is a government mandate that healthcare information be considered as highly classified data
element, to be protected through its lifecycle. Healthcare entities should establish control
measures that will prevent and minimize probabilities of:
This policy should be communicated to all persons involved in the processing of personal health
information. Compliance with this policy and all relevant data protection legislation and
regulations requires appropriate management commitment.
Depending on the size and structure of the entity, the Health Information and Security policy
can be included as part of a single general information security policy document, or can be split
up into multiple policies that reflect the complex nature of the entity. To facilitate entity policy
development process, the Department of Health has provided sample Baseline Policies in
Section 3 of this document. Entities are free to customize the provided baseline policies as per
their environment as long as they remain compliant with the requirements of the ADHICS
Standard and any other DOH or legal requirements.
Note that, besides the Health Information Protection Policy, this domain has the following
supporting or dependent entity policy references:
1) Information Security Management Policy
2) Acceptable Usage Policy
3) Compliance Policy
4) Disciplinary Actions Policy
The Federal Law No. (2) for the year 2019 on the use of Information and Communications
Technology (ICT) in Healthcare mandates security and safety of health information while also
The DOH Policy on the Abu Dhabi Health Information Exchange specifies the following timelines
for notification of breaches. Affected individual(s) (in this case, a patient) must be notified of a
breach without undue delay but in no event later than 60 days from discovery. Notify the DOH
of any breach as soon as reasonably practicable after determining that a Breach occurred, but
in any event within 5 Business Days.
Depending on the size and structure of the entity, the Third Party Security policy can be
included as part of a single general information security policy document, or can be split up into
multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Third Party Security Policy, this domain has the following supporting or
dependent entity policy references:
1) Access Control Policy
2) Operations Management Policy
3) Procurement Policy
4) Supply Chain Management Policy
5) Compliance Policy
Unless the third party is directly involved in healthcare delivery they should normally not have
access to personal health information.
Risks from third party administrative and cleaning staff are often ignored but they pose new
challenges and threats to healthcare entities. The entity’s management should apply adequate
control measures to address those risks.
A formal change management process should be part of the agreement. Parameters of change
should be communicated and agreed between the entity and the third party. If the third party
vendor itself is changed, ensure no sensitive entity data remains with the prior vendor.
The demand for systems and applications to host and process information to deliver business
values needs careful assessment of lifecycle aspects. Wide options and cost effective delivery
models attract entities to determine easy to use and cost effective solutions, ignoring security
aspects in order to quickly deliver on business values.
Healthcare entity management should identify the relevant health information systems and
applications, -related risk factors that impact the entities ability to provide reliable services,
reputation and reliability of the solution/product or vendor. Healthcare entity management
should be aware of the fact that the solution or the product selected will probably introduce
new risks that should managed through their lifecycles.
Based on detailed assessment and entity risk appetite, the healthcare entity’s management
should choose from one of the below options:
1. In-house development, maintenance and support of application and systems
2. Outsource the development, maintenance and support of application and systems
3. Out-of-shelf product deployment, maintained and support by the vendor
4. Cloud-based application utilization
5. Hybrid approach for the development, maintenance and support requirements
Of these any cloud-based option is not acceptable when any personal health information or
other personally identifiable information is to be stored or processed. The Department of
Health may permit limited use provided the cloud is proven to be fully hosted within the UAE.
Storage of such data outside the country may be liable for penalties under Law No. 2 of 2019.
The healthcare entity should develop, enforce and maintain an information systems acquisition,
development and maintenance policy to facilitate implementation of secure development and
maintenance practices.
The purpose of this policy is to ensure information security requirements are integrated into
every part of the software lifecycle for healthcare entities.
Depending on the size and structure of the entity, the Information Systems Acquisition,
Development, and Maintenance policy can be included as part of a single general information
security policy document, or can be split up into multiple policies that reflect the complex
nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Asset Management Policy, this domain has the following supporting or
dependent entity policy references:
The healthcare entity should ensure developer of information systems, system components or
information system services are provided suitable training prior to their involvement in
development activities.
The need to use qualified developers is obvious. This control emphasizes the need to ensure
developers have the right knowledge or are provide the necessary training before they are
involved on the project. The training can be in any form but records should be maintained.
This requirement is applicable for internal as well as external development teams. Information
security should be part of the training scope.
The healthcare entity should validate data input to applications to ensure that the data is
correct and appropriate.
Due to the criticality of data that is handled in a healthcare facility, input data validation should
be implemented to the extent possible. By reducing the chances of erroneous data entry, we
can improve the quality of healthcare delivery. Examples of validation can be out-of-range
values, invalid characters, missing or incomplete data, duplicate records etc.
The healthcare entity should incorporate validation checks into applications to detect any
corruption of information through processing errors or deliberate acts.
Validation of data should happen within program modules. Processing errors and system
failures should be not result in inaccurate or corrupted information. Programs processing in
sequence should wait for the previous process to complete.
Integrity checks like hashes and digital signatures can be used. Some medical devices may also
require special integrity considerations in relation to the electromagnetic emissions that occur
during their operation.
In a healthcare entity it is imperative that the patient identification and health information
retrieved is accurate. If there is a mismatch in the identification or the health information,
healthcare delivery will be severely compromised.
The output validation should be thorough and a log of the validation should be maintained.
Additionally, it should be possible to identify incomplete data, especially in hard copies (missing
pages).
SA 4 Cryptographic Controls
SA 4.1 Key Management
The healthcare entity should establish key management to support the entity’s use of
cryptographic techniques.
Cryptographic keys are used to secure entity data and if compromised it could potentially
expose confidential data. All cryptographic keys should be protected against modification, loss,
and destruction. In addition, secret and private keys need protection against unauthorized
disclosure. Equipment used to generate, store, and archive keys should be physically protected.
All software used within the entity should be controlled. Only approved versions should be used
in production. Updates should be rolled out after testing. Versions no longer supported by the
vendors can be a security risk and should not be used.
The change management process should be followed. Impact on healthcare delivery should be
evaluated at all times.
If vendors are given access to systems or equipment, they should be monitored and such access
should be discontinued as soon as the installation is complete. Use of USB keys for updates
should be monitored. Vendor USB drives should be approved by entity staff before use.
Protecting personal health information is of the highest importance. Any test environment does
not need real personal data. The use of dummy data should be preferred. Deidentified data and
anonymised data can still be a risk. Sanitise test data from all systems. Keep a record of all test
data.
The healthcare entity should supervise and have control over outsourced software
development.
Information security and secure coding should be core requirements. For continuity in case of
vendor failure escrow arrangements should be made for the source code in cases where the
entity does not have ownership of the source code.
The healthcare entity should develop a comprehensive information security strategy against
supply chain threats to the information systems and application, medical devices and
equipment
The healthcare entity should employ security controls to protect supply chain operations.
Suppliers should maintain the confidentiality of the entity’s assets, design specifications as well
as details related to orders received from the entity. Such information may provide a third party
the knowledge to compromise the entity. Supplier should be contractually bound to this
requirement. In the bidding phase minimum information should be shared besides the actual
scope of work.
The healthcare entity should conduct supplier review prior to entering into contractual
agreement to acquire information systems, medical devices and system/devices components or
information system services.
Supplier evaluation should include a check on their commitment to information security. If they
use sub-contractors evaluate how they enforce information security to these suppliers.
The healthcare entity should identify and limit harm from potential adversaries
targeting the entity’s supply chain. Suppliers should maintain the confidentiality of the
entity’s assets, design specifications as well as details related to orders received from
the entity. Such information may provide a third party the knowledge to compromise
the entity. Supplier must be contractually bound to this requirement. In the bidding
phase minimum information should be shared besides the actual scope of work.
The healthcare entity should employ security controls to protect supply chain operations.
Suppliers should maintain the confidentiality of the entity’s assets, design specifications as well
as details related to orders received from the entity. Such information may provide a third party
the knowledge to compromise the entity. Supplier must be contractually bound to this
requirement. In the bidding phase minimum information should be shared besides the actual
scope of work.
The healthcare entity should ensure a reliable (i.e. not modified to provide back-door access or
covert channels) delivery of information systems, medical devices or system/devices
components
Using manufacturer or vendor authorized suppliers and legally licensed software reduces the
risk of back-doors or other compromises. Verify vendors standing with the manufacturers
where necessary. Prefer vendors that can provide multiple layers of support starting with local
The healthcare entity should establish processes to address weakness or deficiencies in supply
chain elements. Even with due diligence while contracting with suppliers, weaknesses may be
found during the life of the contract. These may be found during audits, verification / validation
or as part of vulnerability assessment or penetration testing. Regular assessments of suppliers
are needed.
The healthcare entity should ensure adequate supplies of critical information systems, medical
devices and system/devices components. Unforeseen events or adversaries can impede
organizational operations by disrupting the supply of critical information system components or
corrupting supplier operations.
A healthcare entity’s ability to quickly and confidently respond to and restore service after
disruption attempts shows the entity management’s commitment to its vision and objective
values towards service delivery. Healthcare entity’s management should be aware that
information security incidents will not always be preventable. But adequate procedures,
process and technologies to detect, report and handle incidents, combined with education and
awareness, can minimize their frequency, severity and impact on an entity. This impact could
be on healthcare delivery, assets, reputation, financial and legal.
It is essential that serious information security incidents that can potentially disrupt critical
business processes and healthcare services are promptly communicated to the appropriate
authorities so that they get involved early in the decision-making and communication. Contact
information for the Abu Dhabi Healthcare CERT, which is the 24/7 security operations center of
the Department of Health is available in Section 1 of this document.
Objective:
To ensure that healthcare entities define and utilize suitable processes and resources to identify
and respond to information security and cyber security incidents, that they are not severely
impacted by incident outcomes and that they are able to restore affected operations within an
acceptable timeframe.
The healthcare entity should develop, enforce and maintain an information security incident
management policy, to manage and guide the entity’s response to information security
incidents
The policy should:
1. Be relevant and appropriate to the entity’s operation and risk environment
2. Demonstrate management commitment, objectives and directions
Page 164 of 192
3. Establish incident management roles and responsibilities
4. Establish a proactive, collaborative and sustainable process of identifying and resolving
adverse information security incidents.
5. Establish management demands on:
a. Incident identification
b. Incident response
c. Incident notification/communication
d. Learning from incident
6. Be read and acknowledged by involved internal and external stakeholders
Depending on the size and structure of the entity, the Information Security Incident
Management policy can be included as part of a single general information security policy
document, or can be split up into multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Information Security Incident Management Policy, this domain has the
following supporting or dependent entity policy references:
1) Access Control Policy
2) Operations Management Policy
3) Communications Policy
4) Third party security policy
5) Compliance Policy
The healthcare entity should establish process(es) to guide information security and cyber
security incident response activities
The entity management should acknowledge that not all threats can be prevented and,
therefore, the speed to resolution upon detection is critical. Improving incident response
processes and removing bottlenecks is the way to reduce impacts.
The healthcare entity should establish a Computer Security Incident Response Team (CSIRT)
responsible for incident management and response efforts.
The CSRIT will have members from the management as well as various support departments
like information security, IT, network team, facility security team etc.
Large Hospitals face an increasing amount of cyber security risks. Having a defined team raises
awareness and readiness to respond to an incident.
The healthcare entity should assess and classify information security incidents.
A suggested Information Security Incidents Classification scheme is provided as an appendix to
the template for the Information Security Incidents Management Policy provided in Section A of
this document. Classification of incidents will help prioritize the response.
The healthcare entity should test its Computer Security incident response capabilities.
The healthcare entity should document and preserve records on all information security
incidents.
Documenting information security incidents includes, for example, maintaining records about
each incident, the status of the incident, and other pertinent information necessary for
forensics, evaluating incident details, trends, and handling. Incident information can be
obtained from a variety of sources including, for example, incident reports, incident response
teams, audit monitoring, network monitoring, physical access monitoring, and
user/administrator reports.
The healthcare entity should institutionalize the learning from information security incidents
The healthcare entity should:
1. Ensure lessons learnt from past information security incidents are maintained and shared
with relevant stakeholders to aid in:
a. Addressing future information security incidents
b. Minimizing the recurrence of such incidents
2. Build knowledge database on information security incident diagnosis and response
Additionally, the Department of Health will be collecting Information Security incident details
from the healthcare entities and sharing relevant incident information back to the sector to
minimize such incidents.
The healthcare entity should develop a situational awareness culture by participating in the
information sharing community and obtaining cybersecurity information from various sources.
Additionally, a comprehensive set of partnership initiatives are also being developed by the
Department of Health to contain and limit exposure to information security threats across the
healthcare sector. These include Awareness E-Learning, Security Advisories, Newsletters, Cyber
Threat Intelligence (Brand & Digital Asset Monitoring), Forensic Assessment, Vulnerability &
Technical Assessment, and a Threat Intelligence Platform providing actionable threat
intelligence feeds to entities, specific to their deployed assets. This will leverage the
investments, resources and technologies of the Department of Health to reduce the risk
exposure across the Abu Dhabi Healthcare sector. These initiatives have been branded as the
Abu Dhabi Healthcare CERT.
The healthcare entity should report information security events through appropriate
management channels
Early identification and mitigation of security events in healthcare entities will enhance reliable
healthcare delivery. The Department of Health will collect, analyze and disseminate relevant
advisories to all sector entities. Contact information for the Abu Dhabi Healthcare CERT, which
is the 24/7 security operations center of the Department of Health is available in Section A of
this document.
The healthcare entity should report observed or suspected information security weaknesses in
systems or application services (inclusive of medical devices and equipment)
Early identification and mitigation of security weaknesses in health information systems and
equipment will result in more reliable healthcare delivery. The Department of Health will
collect, analyze and disseminate relevant advisories to all sector entities.
Information systems and applications have become fundamental to a modern medical facility’s
operations. The ability of a healthcare entity’s systems and applications to support identified
critical services and processes in adverse conditions is a measure of the maturity of the
healthcare entity’s operational capabilities.
Though the organization’s Business Continuity process identifies the availability demand on
systems and applications, it is relevant for information systems teams of healthcare entities to
align with such process to establish system, application and resource requirements concerning
critical services and processes.
Healthcare entities should be proactive in identifying threat scenarios that may impact their
information systems and application environment, and devise strategies and plans to ensure
system, application and resource availability to support service continuity of identified critical
services.
Due to high availability requirement of healthcare to the general public, a major effort should
be put into resilience and redundancy arrangements, not just for the technology parts, and but
also for the cross-training of health personnel.
SC 1.1, which defines the requirement for an Information Systems Continuity Management
policy is applicable to Transitional and Advanced entities. The remaining controls of this domain
are applicable for Advanced facilities only.
The healthcare entity should develop, enforce and maintain an Information Systems Continuity
Management policy to manage scenarios that challenge the continued availability of
information systems and applications supporting critical business services.
Depending on the size and structure of the entity, the Information Systems Continuity
Management policy can be included as part of a single general information security policy
document, or can be split up into multiple policies that reflect the complex nature of the entity.
To facilitate entity policy development process, the Department of Health has provided sample
Baseline Policies in Section 3 of this document. Entities are free to customize the provided
baseline policies as per their environment as long as they remain compliant with the
requirements of the ADHICS Standard and any other DOH or legal requirements.
Note that, besides the Information Systems Continuity Management Policy, this domain has the
following supporting or dependent entity policy references:
1) Entity Business Continuity Policy
2) Entity Business Continuity/Recovery Plan
3) Operations Management Policy
4) Communications Policy
5) Compliance Policy
The healthcare entity should develop information systems and application continuity plans that
should prevent or minimize interruptions to critical business services and processes during
adverse situations.
Prioritize critical systems based on Risk Assessment. The information systems and application
continuity plans should align with the organization’s business continuity plans.
The healthcare entity should implement the established information system and application
continuity plans
Once the plans are finalized, procedures have to be developed and fine-tuned ready for plan
activation.
Relevant staff should be trained on these procedures. The entity management should commit
to any costs related to the business continuity plan implementation.
The healthcare entity should test, reassess and maintain its information systems and
application continuity plans.
An information systems and application continuity plan is in place to respond to threats to data
security, including significant data breaches, and it should be tested once a year as a minimum,
with a report to senior management.
Health facilities also need to ensure that the plans that they develop are regularly tested in
different ways like using checklists, tabletop simulations, modular testing and full rehearsals.
This section contains templates which are specific to the procedures defined for certain
policies.
2 Mailbox request
This section describes the activities required post implementation of the controls for
continually improving the effectiveness as part of the PDCA cycle.
The internal audit is a process of checking the compliance with the requirements of ADHICS,
and the information security policies in the entity. This is a periodic activity performed by
qualified auditors who have clear understanding of the ADHICS controls and the information
security processes of the entity. The main objectives of internal audit are to:
This Corrective Action and Preventive Action (CAPA) procedure is to ensure the continual
improvement of the Information Security Management Systems (ISMS) and maintaining the
objectives in place in the entity through the use of audit results, analysis of monitored events,
corrective and preventive actions and management review. This continual improvement
includes:
Corrective actions to eliminate the cause of non-conformity with the control
requirements in order to prevent recurrence;
Preventive action to eliminate the cause of potential non-conformities in order to
prevent their occurrence.
Management Review
The purpose of the MR procedure is to define the process for management commitment and
review of the currently implemented Information Security Management System:
Ensure that management reviews the ISMS;
Specify the continuous suitability, adequacy and effectiveness of the ISMS;
Identify major risks for non-compliance;
Assess opportunities for improvement;
Identify the need for changes to the ISMS, including information security policy and
information security objectives;
The Management Review of the ISMS should occur at the IS Committee not less than once per
year. The IS Manager will take overall responsibility for follow-up activities approved during the
previous Management Review meeting. Progress and developments on actions resulting from
the Management Review will be documented as part of the ISMS Committee meeting minutes.
Follow-up action will not be considered complete until all corrective actions or measures have
been implemented and recorded in the ISMS Committee meeting minutes as being complete.
Metric Findings raised by External and internal ISMS audits & Technical assessments
Measurement of the effective implementation of the Continual Improvement
Description
Procedure
Scope of the
ISMS Scope
metric
To ensure that corrective and preventive actions are effective and timely
Objectives
implemented
Measured by Information Security Manager
Method Analysis, counting, normalize
External and Internal audit reports, technical assessment reports & follow up
Source
documentation
The Information Security Manager will review the reports and follow up
documentation. The findings will be counted (Value A). Findings where the
Procedure resolution/resolution plan is overdue for more than one month will be counted (B).
This section describes the requirements for monitoring the compliance levels of entities and
reporting the same to the Department of Health.
Reporting
The entities should review and submit their updated compliance status to DOH, as part of
periodic compliance reporting, highlighting road map timelines and deviations.
This section consists of selected check lists which will be helpful in the verification of the
compliance requirements for different domains or functions.
All devices containing Personal Health Information [PHI] are inventoried and
can be accounted for.
Any default passwords that come with a product are changed during product
installation.
All staff understand and agree that they shall not hinder the operation of anti-
virus software.
Users are only authorized to access information which they need to know to
perform their duties.
All files have been set to restrict access only to authorized individuals.
Policies are in place prescribing the physical safety and security of devices
and devices.
All staff understand and agree to abide by physical access policies and
procedures.
All staff understand the recovery plan and their duties during recovery.
Every backup run is tested for its ability to restore the data accurately.
All staff understand and agree to abide by mobile device policy and
procedures.
All staff understand and agree that they may not hinder the operation of
firewalls.