What to Include in a Laptop Security Policy

The portability of laptops makes them handy but also easy to steal or lose, which is why it’s critical to have an effective laptop security policy. Although replacing a missing company laptop is expensive, the consequences are much more serious if the missing laptop contains sensitive data. Having sensitive data lost or stolen exposes the company to problems such as the loss of consumer confidence and legal action.

In 2018, a US healthcare provider was forced to notify 43,000 patients that their data was breached after the theft of an unencrypted employee laptop. According to a report published in Forbes, one laptop is stolen every 53 seconds.

Laptop Security Policy

You can help secure your company’s laptops and the data stored in them by creating a laptop security policy. This policy documents the rules and requirements that employees must follow when using a company laptop.

Laptop security policies cover what laptop users should not do. For example, they often state that laptop users should not:

  • Let anyone else use the laptop
  • Use the laptop for personal use
  • Remove the tracking or mobile device management software installed on the laptop in case it is lost or stolen
  • Install applications that are not approved by the company
  • Use the laptop for inappropriate or illegal activities

Equally important, laptop security policies cover what laptop users should do. For example, they often discuss how users should:

  • Physically secure their laptops
  • Protect their laptops from cyber attacks
  • Protect company data
  • Back up their data
  • Return the laptops to the company when they leave

Discussing what should be done is more involved than stating what shouldn’t be done, so here is a closer look at what you might include in these sections.

Physically Securing Laptops

In the section on physically securing laptops, you can document how you want laptop users to secure their computers, especially when not in use. For example, when laptop users are in the office, you might want them to store their laptops in a locked cabinet. When they are on a business trip, you might want them to store their laptops in a hotel’s safe deposit box rather than leave the laptops unattended in a hotel room.

Protecting Laptops from Cyberattacks

Protecting laptops from cyberattacks is an important section to include in your laptop security policy. Laptops usually do not stay connected to the network. As a result, they might not get the necessary software updates, including updates to the software that detects viruses, malware, and spyware. For this reason, it is a good idea to require that laptop users log on to the company network at least once a week to update company software.

Plus, if your company laptops are WiFi enabled, you should require users to verify any free WiFi hotspots before using them. Cybercriminals have set up fake WiFi hotspots at hotels, cafes and restaurants that look legitimate. If a laptop user logs on to a fake WiFi hotspot, the cyber criminal will see everything the user does online, including any usernames and passwords being entered. In addition, if the laptop is set up to allow file sharing, the cyber criminal can steal data and install malware on it. Verifying a free WiFi hotspot with the establishment supposedly offering it can help prevent this type of cyber attack as well as working with a cyber security consultant.

Protecting Company Data

In the section on protecting company data, you can cover the measures you want laptop users to take to protect their data. There are general measures you will want to include, such as creating strong passwords and not sharing them with anyone. You will also want to include any encryption requirements, such as requiring users to encrypt their files or encrypt a drive using the company-approved encryption tool. Plus, if your company has a virtual private network, you will want to require laptop users to use it when travelling for business or working from home.

Backing Up Data

Laptops that are not connected to the network during a company’s network backup operation will not get backed up. To make sure that backups are performed on laptops, you can require that laptop users perform a backup at least once a week. You will need to specify the backup method. There are many types, including backing up to a server on the network, backing up to a DVD or an external drive, and backing up to a company’s private cloud. If laptop users are backing up to a DVD or external drive, you need to make sure they encrypt and physically secure their backups.

Returning the Laptop

Your laptop security policy should address how and when laptop users must return the company-supplied laptops and peripherals upon termination of employment. If the users backed up their laptop files to DVDs or external hard drives, those backups need to be returned to the company as well.

A Good Start

Including these sections is a good way to start your laptop security policy and is one aspect of your IT Strategy. You will likely want to customise it by adding rules and requirements you feel are necessary and removing those that do not apply.

After creating the laptop security policy, you need to have each laptop user read and sign it. You also need to enforce all the rules and requirements in it.

Read more about data security:

How to Prevent Data Breaches in Your Business

Why Good Cyber Security Is a Positive for your Business

Critical Tips for Improving Password Security

 

Contact Us

Name(Required)
This field is for validation purposes and should be left unchanged.

Find out how we can help with your IT challenges.

About the author:

Ash Klemm

Ash Klemm

Ash has over 20 years of experience in sales and marketing.His journey from a casual salesperson at Chandlers to State Manager at a national IT distribution company, while battling health issues, including a double lung transplant in 2015, gave him the experience, know-how, tenacity, and marketing insight, to find solutions and help businesses grow.After spending several years in the ivory tower of state management, Ash missed the genuine connection of face to face meetings and helping make a difference to businesses in need.His authentic, conversational, and easy-going nature helps our customers feel at ease and shows them we are a brand to trust. Ash spends his days advocating for our customers to ensure they receive the best possible service in a timely fashion. Ash is also the in house chair builder.His curiosity and natural problem-solving ability make him the perfect first call for all our new customers to help determine what is wrong, how Surety IT can help and what the best solutions are moving forward.
Scroll to Top