536
edits
No edit summary |
|||
Line 2: | Line 2: | ||
The aim of the policy is to describe the controls required and necessary to significantly reduce the risks of information security affecting laptops. | The aim of the policy is to describe the controls required and necessary to significantly reduce the risks of information security affecting laptops. | ||
Laptop computers are an essential business tool but their very portability makes them particularly vulnerable to physical damage or theft. | Laptop computers are an essential business tool but their very portability makes them particularly vulnerable to physical damage or theft. The fact that they are often used outside the premises of Future Worlds Center, increases the threats. | ||
In addition, portable computers are especially vulnerable to physical damage or loss, and theft, either for resale or for the information they contain which is a vital asset of the Organization. | In addition, portable computers are especially vulnerable to physical damage or loss, and theft, either for resale or for the information they contain which is a vital asset of the Organization. | ||
This policy refers to certain general information security policies, but the specific information given here is directly relevant to the organization-owned laptops. | This policy refers to certain general information security policies, but the specific information given here is directly relevant to the organization-owned laptops, see . | ||
edits