- Put in place a procedure for granting staff different levels of access to programs, websites, computers, and client information, based on job roles and responsibilities. This is known as ‘role-based access control’. Limit staff access to what is necessary for their role.
- Ensure contractors, temporary staff, interns and trainees are only given access to the information and systems they need to do their job for as long as you employ or engage them. Provide them with their own individual login details, or with temporary guest access.
- Record access permissions and monitor staff access to sensitive information (i.e. check that information is only accessed by appropriate persons with the correct level of access). Consider using access control software to keep track of who has access to what.
- Regularly review who has permission to access sensitive information, preferably once a month. Promptly update access for staff who change roles; revoke access for staff who leave your practice at the time of their exit.
- Don’t use accounts with administrator access (i.e. complete and unrestricted access to create, delete, and modify files, folders, and settings) for everyday tasks. Set up standard user accounts for everyday work, and reserve administrator access for IT administration (e.g. installing software).
- Only use shared accounts (i.e. accounts owned by the organisation rather than a staff member, such as library accounts and social media accounts) where there is no other option.
| Giving users access to work systems and data beyond what is required to do their job. - Inappropriately devolving access to, and responsibility for managing, online accounts (e.g. to an assistant).
- Not promptly revoking temporary access, or re-using login accounts (e.g. ‘intern1’) for temporary staff.
|