<section title="22.2. Working Outside the Office"><subsection title="Objective"><paragraph
    title="22.2.1."


><![CDATA[<p>Information&nbsp;on mobile devices is not accessed from public or insecure locations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.2.2."


><![CDATA[<p>This section covers information on accessing information using agency-owned mobile devices from unsecured locations outside the office and home environments. &nbsp;This section does not apply to working from home; requirements relating to home-based work are outlined in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17108">Section 21.3 – Working From Home</a>. &nbsp;Further information on the use of mobile devices can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.2.3."


><![CDATA[<p>Also refer to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>&nbsp;for requirements on product security, selection, maintenance, sanitisation and disposal.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Working outside the office"><paragraph
    title="22.2.4.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>As the security risk relating to specific targeting of mobile devices capable of processing highly classified information is high, these mobile devices cannot be used outside of facilities certified to an appropriate level to allow for their use. &nbsp;In addition, as agencies have no control over public locations including, but not limited to, such locations as public transport, transit lounges, hotel lobbies, and coffee shops, mobile devices are <strong>not</strong> approved to process classified information as the security risk of classified information being overheard or observed is considered to be too high in such locations.</p>]]></paragraph>
<paragraph
    title="22.2.4.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4541"
><![CDATA[<p>Agencies MUST NOT allow personnel to access or communicate classified information on mobile devices outside of secure areas unless there is a reduced chance of being overheard and having the screen of the device observed.</p>]]></paragraph>
<paragraph
    title="22.2.4.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4542"
><![CDATA[<p>Agencies allowing personnel to access or communicate classified information outside of the office SHOULD NOT allow personnel to do so in public locations (e.g. public transport, transit lounges, hotel lobbies and coffee shops).</p>]]></paragraph>
</block>
<block title="Carrying mobile devices"><paragraph
    title="22.2.5.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices used outside the office are frequently transferred through areas not certified to process the classified information on the device. &nbsp;Mechanisms need to be put in place to protect the information stored on those devices.</p>]]></paragraph>
<paragraph
    title="22.2.5.R.02."

    tags="Governance,Mobile Devices"


><![CDATA[<p>When agencies apply encryption to mobile devices to reduce their physical transfer requirements it is only effective when the encryption function of the device is not authenticated. &nbsp;In most cases this will mean the mobile device will be in an unpowered state (i.e. &nbsp;not turned on), however, some devices are capable of deauthenticating the cryptography when it enters a locked state after a predefined timeout period. &nbsp;Such mobile devices can be carried in a locked state in accordance with reduced physical transfer requirements based on the assurance given in the cryptographic functions.</p>]]></paragraph>
<paragraph
    title="22.2.5.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4546"
><![CDATA[<p>Agencies MUST ensure mobile devices are carried in a secured state when not being actively used, by:</p>
<ul>
<li>power off; or</li>
<li>power on but pass code enabled.</li>
</ul>]]></paragraph>
</block>
<block title="Using mobile devices"><paragraph
    title="22.2.6.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices are portable in nature and can be easily stolen or misplaced. &nbsp;It is strongly advised that personnel do not leave mobile devices unattended at any time.</p>]]></paragraph>
<paragraph
    title="22.2.6.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4550"
><![CDATA[<p>When in use mobile devices MUST be kept under continual direct supervision.</p>]]></paragraph>
</block>
<block title="Travelling with mobile devices"><paragraph
    title="22.2.7.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>If personnel place mobile devices or media in checked-in luggage when travelling they lose control over the devices. &nbsp;Such situations provide an opportunity for mobile devices to be stolen or tampered with by an attacker.</p>]]></paragraph>
<paragraph
    title="22.2.7.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4554"
><![CDATA[<p>When travelling with mobile devices and media, personnel MUST retain control over them at all times including by not placing them in checked-in luggage or leaving them unattended.</p>]]></paragraph>
<paragraph
    title="22.2.7.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4555"
><![CDATA[<p>Travelling personnel requested to decrypt mobile devices for inspection or from whom mobile devices are taken out of sight by border control MUST report the potential compromise of classified information or the device to an ITSM as soon as possible.</p>]]></paragraph>
</block>
</subsection>
</section>
