0
1
Information SecurityInformation Security
Toolbox Talk
This document is made available on the condition that it is used s...
2
Rule 1Rule 1
 Always keep to our Policies
 Keep to our information security policies.
 Obey the customer’s informatio...
3
Rule 2Rule 2
 Handle information with care
 Keep your desk / work area clear.
 Keep confidential information
protecte...
4
Rule 3Rule 3
 Keep your passwords and PINs secret
 Use quality passwords and PINs, and change them
regularly
 Keep yo...
5
Rule 4Rule 4
 Know whom you’re dealing with
 Exercise caution in conversations and professional
interactions.
 Ensure...
6
Rule 5Rule 5
 Use e-mail and the Internet with care
 Use e-mail and the Internet primarily
for business purposes.
 Do...
7
Rule 6Rule 6
 Pay attention to physical security and
mobile equipment
 Escort guests and make sure they
wear their vis...
8
Rule 7Rule 7
 Report incidents like viruses, thefts and
losses.
 Report suspicious activity at your workstation / area...
Upcoming SlideShare
Loading in...5
×

16 info securitytoolbox1g (1)

80

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
80
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "16 info securitytoolbox1g (1)"

  1. 1. 1 Information SecurityInformation Security Toolbox Talk This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating their own safety training and procedures. © A. Groves & Océ (UK) Ltd
  2. 2. 2 Rule 1Rule 1  Always keep to our Policies  Keep to our information security policies.  Obey the customer’s information security rules.  Respect the law and privacy legislation.  Use approved hardware and licensed software only.
  3. 3. 3 Rule 2Rule 2  Handle information with care  Keep your desk / work area clear.  Keep confidential information protected (under lock & key) during breaks and when going home.  Remove printed matter from printers, copiers and faxes immediately  Dispose of documents and digital media securely
  4. 4. 4 Rule 3Rule 3  Keep your passwords and PINs secret  Use quality passwords and PINs, and change them regularly  Keep your password and PINs secure and don’t share them with anyone.  Use password-protected screensavers.  Log off and switch the PC off before going home.
  5. 5. 5 Rule 4Rule 4  Know whom you’re dealing with  Exercise caution in conversations and professional interactions.  Ensure that you know who you are communicating with on the phone, the internet or via e-mail.  Use your best professional judgement when getting or giving information. Not everything is true.
  6. 6. 6 Rule 5Rule 5  Use e-mail and the Internet with care  Use e-mail and the Internet primarily for business purposes.  Don’t open any strange e-mails or attachments and be careful when downloading information.  Don’t send strictly confidential information via e-mail unless it is encrypted.  Don’t access, download, store and send illegal or offensive materials.
  7. 7. 7 Rule 6Rule 6  Pay attention to physical security and mobile equipment  Escort guests and make sure they wear their visitor badges.  Question strangers about their presence in your department.  Protect your mobile equipment with a password or PIN and don’t leave it unattended.  Avoid the use of non-company equipment on the company network.
  8. 8. 8 Rule 7Rule 7  Report incidents like viruses, thefts and losses.  Report suspicious activity at your workstation / area immediately.  Report all security incidents like thefts, losses, etc. to your manager and security co-ordinator.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×