Employee Handbook

2021.1

Employee Handbook and Policy Quick Reference

This is an abridged version of LifeOmic’s security policy that all workforce members are required to be familiar with and comply with.

You are assumed to have read and fully understood the corporate security and privacy policies, standards, guidelines, controls and procedures even if you haven’t. So, it’s probably best you still go through the whole thing at some point.

  • First and foremost, as a Health IT provider, LifeOmic and all its employees must fully comply with HIPAA Security and Privacy regulations. All workforce members much complete the required HIPAA training.

  • You are also required to follow detailed procedures defined in certain policies related to your job role.

Security is everyone’s responsibility. If this is not your first job, don’t do anything that might get you in trouble at your previous workplace. When in doubt, stop and ask.


    As a LifeOmic employee, I acknowledge that

    * I have reviewed and will comply with company [security policies and
      procedures][employee-handbook-1], [acceptable use][employee-handbook-2],
      and [sanction policies][employee-handbook-3].
    * I accept that my work devices, including approved BYOD devices, and
      activities on such devices are subject to security monitoring.
    * I will protect my work devices at remote locations and will not leave
      devices unattended.
    * I will ensure my laptops and workstations are securely configured with whole
      disk encryption, endpoint security agent, malware protection, local
      firewall, password protected screensaver, and latest security patches.
    * I will follow documented policies and procedures to protect sensitive and
      confidential data.
    * I have completed the required [HIPAA awareness training][employee-handbook-4].
    * I understand that PHI data may only be stored on in approved production
      environments.
    * I understand company and regulatory requirements to protect critical data
      and will NOT

        * store critical data such as PHI and passwords on online file shares
          (such as Google Drive, SharePoint, Dropbox), in logs and source codes;
        * send critical data such as PHI and passwords by email, chat, or similar
          public communication channels;
        * post critical data such as PHI and passwords in blogs, support tickets
          or other public forums; and
        * discuss patient information in public.

    * I understand that use of paper records and fax transmission for PHI is not
      allowed.
    * I will keep my passwords confidential and will NOT share my individual user
      passwords with other users.
    * I will NOT use shared/generic, guest/anonymous, emergency or temporary
      accounts without explicit approval.
    * I will regularly back up business data on my user devices to approved data
      storage media/repositories such as the company SharePoint site.
    * I will report any incident and suspicious activity to Security and/or my
      manager.
    * I understand that I am responsible for reporting suspect criminal
      activity such as money laundering or antitrust violations, following the
      reporting guidelines laid out in this document.

Training

You will be prompted as part of onboarding, and periodically going forward, to complete the following security training:

Acceptable use policy for end-user computing

LifeOmic policy requires that:

(a) Per LifeOmic security architecture, all workforce members are primarily considered as remote users and therefore must follow all system access controls and procedures for remote access.

(b) Use of LifeOmic computing systems is subject to monitoring by LifeOmic IT and/or Security team.

(c) Employees may not leave computing devices (including laptops and smart devices) used for business purpose, including company-provided and BYOD devices, unattended in public.

(d) Device encryption must be enabled for all mobile devices accessing company data, such as whole-disk encryption for all laptops.

(e) Use only legal, approved software with a valid license. Do not use personal software for business purposes and vice versa.

(f) Encrypt all email messages containing sensitive or confidential data.

(g) Employees may not post any sensitive or confidential data in public forums or chat rooms. If a posting is needed to obtain technical support, data must be sanitized to remove any sensitive or confidential information prior to posting.

(h) Anti-malware or equivalent protection and monitoring must be installed and enabled on all endpoint systems that are commonly affected by malware, including workstations, laptops and servers.

(i) All data storage devices and media must be managed according to the LifeOmic Data Classification specifications and Data Handling procedures.

(j) It is strictly forbidden to download or store any ePHI on end-user computing devices, including laptops, workstations and mobile devices.

(k) Mobile devices are not allowed to connect directly to LifeOmic production environments.

Your responsibilities for computing devices

LifeOmic provides company-issued laptops and workstations to all employees. LifeOmic currently does not require or support employees bringing their own computing devices.

The laptops and/or workstations assigned to you are yours to configure and manage according to company security policy and standards. You are responsible to

  • configure the system to meeting the configuration and management requirements, including password policy, screen protection timeout, host firewall, etc.;

  • ensure the required anti-malware protection and security monitoring agent is installed and running; and

  • install the latest security patches timely or enable auto-update.

IT and Security provides automated scripts for end-user system configurations and/or technical assistance as needed.

You are also responsible for maintaining a backup copy of the business files local on your laptop/workstation to the appropriate location on LifeOmic file sharing / team site (e.g. SharePoint). Examples of business files include, but are not limited to:

  • Documents (e.g. product specs, business plans)
  • Presentations
  • Reports and spreadsheets
  • Design files/images/diagrams
  • Meeting notes/recordings
  • Important records (e.g. approval notes)
DO NOT backup critical data such as ePHI or PII to file sharing sites.
If you have such critical data locally on your device, contact IT and
Security for the appropriate data management and protection solution.

Unless the local workstation/developer has access to Critical data, backups of user workstations/devices are self managed by the device owner. Backups may be stored on an external hard drive or using a cloud service such as iCloud if and only if the data is both encrypted and password protected (passwords must meet LifeOmic requirements).

Getting help

Support for most of our business applications are self-service, such as password reset via Okta.

If needed, users may use our internal service desk to request IT and Security support. Common requests include:

  • Password reset and access requests
  • Request new software and hardware
  • Technical support
  • Recommend changes to policies and processes

How to report an incident or suspicious activity

You are responsible to report all suspicious activities and security-related incidents immediately to the Information Security team, by one of the following channels:

  • (preferred) “Report a security incident” by creating an issue on Github and/or via the internal help desk

  • If access to JIRA is not available, employees may send an email to security@lifeomic.com

  • For non-sensitive, non-confidential security issues and concerns, employees may post questions on LifeOmic’s #infosec Slack channel.

  • Additionally, employees may report the incident to their direct manager.

  • To report a concern under the Whistleblower Policy, you may first discuss the concerns with your immediate manager, or report it directly to the CEO, COO, or CISO. If anonymity is desired, look up the appropriate contact person’s phone number in EaseCentral and send an anonymous SMS message via an alternate phone or via a free web-to-sms gateway like SendAnonymousSMS.

    See the Whistleblower Policy section in the HR Security Policy for additional details.