Professional Documents
Culture Documents
Practical Guide For Remote Access To Plant Equipment 38
Practical Guide For Remote Access To Plant Equipment 38
They should
impose responsibilities not just on the receiver of confidential
data but also on the source of confidential data. That goes for
cybercrime as well. It is not fair to place all risk for cybercrime
on the company gaining access when the facility owner does not
have even the most minimal protections of its own in place. In
the case of maintenance and monitoring arrangements, it is wise
to have a separate contract or work order in place that spells out
the rules—including the establishment of clear distinctions, for
instance, between responding to a routine service request and
implementing the upgrade of a system.