1 / 18

Handling Confidential Tobacco Product Information in accordance with EMTOC Instructions

Learn practical aspects of handling confidential tobacco product information following EMTOC instructions provided by the Federal Office of Consumer Protection and Food Safety (BVL). This includes installation of necessary software, such as TrueCrypt for secure data storage, and important security measures to ensure data protection.

lspringer
Download Presentation

Handling Confidential Tobacco Product Information in accordance with EMTOC Instructions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Practical aspects in handling confidential tobacco product information in accordance to the EMTOC instructions Federal Office of Consumer Protection and Food Safety (BVL) Andreas Butschke

  2. The main EMTOC software is available via internet - a internet browser is required For the access to the web portal software for the card reader has to be installed once For the secure storage of downloaded data from the EMTOC system to the personal computer the installation of the encryption software TrueCrypt is required Required software for regulators

  3. Open Source software (no license fees) No special hardware is required Flexible use, also for Thin Clients or USB flash drives Available for Windows, Mac OS X and Linux operating systems Once installed with administrator rights it can be used with normal user rights TrueCrypt - benefits

  4. True Crypt - how it works After starting the software TrueCrypt it is possible to create or to open an already existing encrypted area. The encrypted area is saved at the hard disk as file (container). After this file was opened (mounted) by TrueCrypt it appears to the user as a volume like a hard drive or USB flash drive. That means several files can be saved in this volume and files can directly be loaded and edited on this volume. If the volume is mounted the data stored in this volume is accessible to (all) computer or network users in the same way as other files that are stored at this computer. The data is only protected, if the volume is dismounted! The volume will be automatically dismounted, if the computer is turned off (not in the idle state) over the shut down procedure or by force (unplug).

  5. Open TrueCrypt Press ‘Create Volume‘ Select ‘Create a standard TrueCrypt volume‘ (NEXT) Create volume if not existing

  6. Specify location and file name

  7. AES or Twofish are accepted as highly secure Select encryption method

  8. e.g. between 200 and 1000 MB Specify volume size

  9. Enter a secure password

  10. ‘Format‘ means that the file will be filled completely with random data Exit after format was finished Generating random data

  11. Open TrueCrypt Select a free volume letter (e.g. K:) Select file from pull-down list (history) or with file manager Press ‘Mount‘ button Open existing volume

  12. Enter your password

  13. Mounted volume will be listed You can close the window with ‘Exit‘ Please close the volume after work has been finished with the ‘Dismount‘ button Successful mounting

  14. The encrypted volume can be accessed with the Windows Explorer or with each other software (save as...) Working with the mounted volume

  15. Open TrueCrypt before downloading confidential data Save the downloaded data directly and soleley to the TrueCrypt volume Close the volume (dismount) if you are not working with the data Open the volume only for storage or evaluation of the confidential data How to work with TrueCrypt

  16. Software and documentation (e.g. Beginner‘s Tutorial) is online available Software web site

  17. The encyption is as secure as the password! Very bad (Score 5): project Bad (Score 20): emtocproject + at least 10 characters + character sequence not contained in commond word lists (emtoc) Weak (Score 40): EmTocProject + upper/lower case characters (a-z and A-Z) Good (Score 80): EmToc-Project#2000* + numbers (0-9) + special characters (-+.,;:_#/*%&?${}[]() ) Strong (Score >80): EmToc-Prjct#2001* df87ú§,ä + special language characters (öäüéàèÖÄÜÉÀÈç) + no repeats (000) + longer Crucial point: password

  18. Be sure that the virus scanner ist up-to-date Delete the cache memory of the internet browser Close the browser software after access to the EMTOC database Before working with office tools, deactivate the auto-save function in menu ‘Options‘ or define the save path to the encrypted volume (this will cause errors if you are referring to a volume that is not mounted) After working with office tools or other software, empty the recycle bin of the computer Further security aspects for the user

More Related