Sensitive information may be recorded and sent out of the organization. Protect and control the transmittal of audio media files.
This policy identifies electronic communication with attachment(s) being sent to non-commercial domains (Hotmail, Yahoo, Gmail, and domains ending in .gov, .edu, .info, and so on), which immediately raises concerns as to whom the information is being distributed.
This policy detects the forwarding of content originally sent by senior management.
This policy identifies graphic and image files in various formats.
This policy identifies users sending messages over a certain size or files over a certain size.
This policy detects print jobs that exceed a specified number of pages and warns the user.
This policy identifies common hacking utilities and terms such as spoofing, buffer overflow tools, log wiping tools and password database cracking tools.
This policy detects content that has been protected with a password or has been encrypted.
Regulators suggest that adding a targeting a reasonable percentage of messages for random review, in addition to normal lexicon-based reviews, is a prudent practice since such random reviews may discover issues not normally detected by ordinary means. This policy will randomly select messages, based on a percentage that is defined by the firm, to be automatically included in a reviewer’s queue.
This policy detects the disclosure and sharing of passwords both inside and outside the organization.
This policy identifies electronic communication with blank subjects whose context suggests that the sender is attempting to avoid detection.
This policy identifies electronic communication with a specified number (or threshold) of attachments, which could suggest a drive dump or other inappropriate bulk transfer of files.
This policy identifies inappropriate bulk transfer of e-mail file folders which includes .PST and .NSF files.
This policy identifies video media files in various formats.
Copyright © 2014 CA.
All rights reserved.
|
|