<section title="11.3. Telephones and Telephone Systems"><subsection title="Objective"><paragraph
    title="11.3.1."


><![CDATA[<p>Telephone systems are prevented from communicating unauthorised classified information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.3.2."


><![CDATA[<p>This section covers information relating to the secure use of fixed, including cordless, telephones, as well as the systems they use to communicate information.</p>]]></paragraph>
<paragraph
    title="11.3.3."


><![CDATA[<p>Information regarding Voice over Internet Protocol (VoIP) and encryption of data in transit is covered in <a title="Video &amp; telephony conferencing and internet protocol telephony" href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a> and <a title="Cryptographic fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="11.3.4."


><![CDATA[<p>It MUST be noted that VOIP and cellular phones have some of the same vulnerabilities as wired and cordless phones.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Telephones and telephone systems usage policy"><paragraph
    title="11.3.5.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>All unsecure telephone networks are subject to interception. The level of expertise needed to do this varies greatly. Accidentally or maliciously revealing classified information over a public telephone networks can lead to interception.</p>]]></paragraph>
<paragraph
    title="11.3.5.C.01."

    tags="Communications systems,Governance,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2627"
><![CDATA[<p>Agencies MUST develop a policy governing the use of telephones and telephone systems.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.3.6.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using telephones. It is important that personnel are made aware of what levels of classified information they discuss on particular telephone systems as well as the audio security risk associated with the use of telephones.</p>]]></paragraph>
<paragraph
    title="11.3.6.C.01."

    tags="Communications systems,Governance,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2630"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations using both internal and external telephone connections.</p>]]></paragraph>
<paragraph
    title="11.3.6.C.02."

    tags="Communications systems,Governance,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2631"
><![CDATA[<p>Agencies SHOULD advise personnel of the audio security risk posed by using telephones in areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Visual indication"><paragraph
    title="11.3.7.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>When single telephone systems are approved to hold conversations at different classifications, alerting the user to the classification level they can speak at when using their phone will assist in the reducing the risk of unintended disclosure of classified information.</p>]]></paragraph>
<paragraph
    title="11.3.7.C.01."

    tags="Communications systems,Governance,Telephony"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2637"
><![CDATA[<p>Agencies permitting different levels of conversation for different types of connections MUST use telephones that give a visual indication of the classification of the connection made.</p>]]></paragraph>
</block>
<block title="Use of telephone systems"><paragraph
    title="11.3.8.R.01."

    tags="Communications systems,Encryption,Technical,Telephony"


><![CDATA[<p>When classified conversations are to be held using telephone systems, the conversation needs to be appropriately protected through the use of encryption measures.</p>]]></paragraph>
<paragraph
    title="11.3.8.C.01."

    tags="Communications systems,Encryption,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2643"
><![CDATA[<p>Agencies intending to use telephone systems for the transmission of classified information MUST ensure that:</p><ul>
<li>the system has been accredited for the purpose; and</li>
<li>all classified traffic that passes over external systems is appropriately encrypted.</li>
</ul>]]></paragraph>
</block>
<block title="Cordless telephones"><paragraph
    title="11.3.9.R.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


><![CDATA[<p>Cordless telephones have little or no effective transmission security, therefore should not be used for classified or sensitive communications. They also operate in an unlicensed part of the radio spectrum used for a wide range of other devices.</p>]]></paragraph>
<paragraph
    title="11.3.9.C.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="2648"
><![CDATA[<p>Agencies MUST NOT use cordless telephones for classified conversations.</p>]]></paragraph>
<paragraph
    title="11.3.9.C.02."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2649"
><![CDATA[<p>Agencies SHOULD NOT use cordless telephones for classified or sensitive conversations.</p>]]></paragraph>
</block>
<block title="Cordless telephones with secure telephony devices"><paragraph
    title="11.3.10.R.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


><![CDATA[<p>As the data between cordless handsets and base stations is not secure, cordless telephones MUST NOT be used for classified communications even if the device is connected to a secure telephony device.</p>]]></paragraph>
<paragraph
    title="11.3.10.C.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="All Classifications"
    compliance="Must Not"
    cid="2652"
><![CDATA[<p>Agencies MUST NOT use cordless telephones in conjunction with secure telephony devices.</p>]]></paragraph>
</block>
<block title="Speakerphones"><paragraph
    title="11.3.11.R.01."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Speakerphones are designed to pick up and transmit conversations in the vicinity of the device they should not be used in secure areas as the audio security risk is extremely high.</p>]]></paragraph>
<paragraph
    title="11.3.11.R.02."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>If the agency is able to reduce the audio security risk through the use of appropriate countermeasures then an exception may be approved by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="11.3.11.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2656"
><![CDATA[<p>If a speakerphone is to be used on a secure telephone system within a secure area, agencies MUST apply the following controls:</p><ul>
<li>it is located in a room rated as audio secure;</li>
<li>the room is audio secure during any conversations; </li>
<li>only cleared personnel involved in discussions are present in the room; and</li>
<li>ensure approval for this exception is granted by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Off-hook audio protection"><paragraph
    title="11.3.12.R.01."

    tags="Communications systems,Technical,Mobile Telephony"


><![CDATA[<p>Providing off-hook security minimises the chance of accidental classified conversation being coupled into handsets and speakerphones. Limiting the time an active microphone is open limits this threat. This is normally achieved with push-to-talk (PTT) mechanisms.</p>]]></paragraph>
<paragraph
    title="11.3.12.R.02."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Simply providing an off-hook audio protection feature is not, in itself, sufficient. To ensure that the protection feature is used appropriately personnel will need to be made aware of the protection feature and trained in its proper use. Where PTT or some other similar functionality is installed, the activation mechanism (such as a button or switch) must be clearly labelled.</p>]]></paragraph>
<paragraph
    title="11.3.12.R.03."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Many new digital desk phones control these functions through software, rather than a mechanical switch.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="2661"
><![CDATA[<p>Agencies MUST ensure that off-hook audio protection features are used on all telephones that are not accredited for the transmission of classified information in areas where such information could be discussed.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.02."

    tags="Communications systems,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2662"
><![CDATA[<p>Agencies MUST use push-to-talk mechanisms to meet the requirement for off-hook audio protection. PTT activation MUST be clearly labelled.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.03."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2663"
><![CDATA[<p>Agencies SHOULD ensure that off-hook audio protection features are used on all telephones that are not accredited for the transmission of classified information in areas where such information could be discussed.</p>]]></paragraph>
</block>
<block title="Electronic Records Retention and Voicemail"><paragraph
    title="11.3.13.R.01."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Voicemail and other messages and communications may fall within the legal definition of electronic records. If so retention and archive requirements are prescribed.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2666"
><![CDATA[<p>Agencies MUST remove unused voice mailboxes.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.02."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2667"
><![CDATA[<p>Agencies MUST expire and archive or delete voicemail messages after the retention period determined by the agency’s electronic records retention policy.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.03."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2669"
><![CDATA[<p>Agencies SHOULD develop and implement a policy to manage the retention and disposal of such electronic records, including voicemail, email and other electronic records.</p>]]></paragraph>
</block>
</subsection>
</section>
