536
edits
No edit summary |
|||
Line 42: | Line 42: | ||
== Controls against unauthorized access to data == | == Controls against unauthorized access to data == | ||
- You must use approved encryption software on all organization-owned laptops. Choose a long, strong encryption password/phrase and keep it secure. You can contact to the IT responsible of the Organization for further information on laptop encryption. If your laptop is lost or stolen, encryption provides strong protection against unauthorized access to the data. | |||
- You are personally accountable for all network and systems access under your user ID, so keep your password safe. Do not share it with anyone including members of your family, friends or IT staff of the Organization. | |||
- Organization-owned laptops are provided for official use by authorized Associates. Do not loan your laptop or allow it to be used by others such as family members and friends. | |||
- Do not leave your laptop unattended and logged-on. Before walking away from the laptop, always shut down, log off or activate a password-protected screensaver. |
edits