You are here:HomeIssuesInsurance Business Practices & Technical Information2009Monitor, Verify and Audit Your Agency's Data Security Policy

Monitor, Verify and Audit Your Agency's Data Security Policy

Laptop users access data through VPN or remote desktop solutions. (You use laptop computers but they do not contain any personal information on customers.)...
December 15, 2009

Many agencies feel comfortable that they have a sound data security policy in place by using one or all of the following techniques:

  • Laptop users access data through VPN or remote desktop solutions. (You use laptop computers but they do not contain any personal information on customers.)
  • Confidential information is only on computers or paper files in your office.
  • Employees and consultants are made aware of your data security policy and you are confident they are sticking to it.

When was the last time you checked that your employees and consultants were in compliance with your policy? How do you know and how do you prove it if challenged?

"Based on information provided by PIA, we recently installed the Laptop Protective Services on our company computers. We now have vastly improved compliance with our data security policy and the ability to audit the location of sensitive information at any point in time. This gives us, and our customers, confidence that we are taking data security seriously. At about $0.20 per day per computer and the simplicity of implementation, we feel that Laptop Protective Services provides us with a high value compliance and data auditing capability," stated Michael Conway, president of the Michael G. Conway Insurance Agency in Lowell Massachusetts.

With low cost of ownership and no requirement for IT resources, you can have a fully automated security policy audit that will allow you to:

  • Monitor and audit what data is stored on any computer in your agency.
  • Correct situations not in compliance with your data security policy.
  • Monitor location of laptops.
  • Lock down computers that fall into the wrong hands or are accessed by people that do not have your best interests at heart (a disgruntled employee or an agent that is leaving and going to a competitor).

Click here for additional information or to get data security protection.