536
edits
Line 42: | Line 42: | ||
== Controls against unauthorized access to data == | == Controls against unauthorized access to data == | ||
* You must use approved encryption software on all organization-owned laptops. Choose a long, strong encryption password/phrase and keep it secure. You can contact to the IT responsible of the Organization for further information on laptop encryption. (If your laptop is lost or stolen, encryption provides strong protection against unauthorized access to the data.) | |||
* You are personally accountable for all network and systems access under your user ID, so keep your password safe. Do not share it with anyone including members of your family, friends or IT responsible of the Organization. | |||
* Organization-owned laptops are provided for official use by authorized Associates. Do not allow it to be used by others such as family members and friends. | |||
* Do not leave your laptop unattended and logged-on. Before walking away from the laptop, always shut down, log off or activate a password-protected screensaver. | |||
== Other controls == | == Other controls == |
edits