SlideShare a Scribd company logo
1 of 8
Poicy
Computing, Software, Peripherals and
related Devices
 External Party shall ensure Computing Devices under his/her care are either
switched off or protected with screensaver lock when he/she is not present within
visible range of their computing device.
 External Party shall ensure that Computing Devices are up-to-date as such it is
their responsibility switch off / reboot their Computing Devices daily, to allow the
updates of Computing Device’s OS, software, configuration and anti-virus
definitions.
 External Party shall not install or use software that are not approved by WRS IT.
Please refer to Authorised Applications Standards.
 External Party shall ensure that the Computing Devices that they use to access our
network, asset & data have up-to-date patches, and anti-virus software with up-
to-date definitions installed on the device. Anti-virus end-point protection need to
be in the Gartner’s Magic Quadrant for End-Point protection.
Network Access Rights
 External Party must only use IT approved Network-enabled Devices to access Company IT Network;
Personal Computing Devices are prohibited from accessing Company IT Network that are not
accessible directly over the Internet.
 External Party cannot bring and plug in personal Network-enabled Devices to Company IT Network
without IT approval.
 External Party shall ensure that their Computing Devices are adequately protected against virus and
keyloggers when using their personal Computing Devices to access Company IT Assets that is
available over Internet, not limited to Company Web Services (e.g. Administration) and Cloud
Services (like Email / Intranet);
Email / Electronic Documents / Collaboration Tools
1. External Party shall not use Company email for non-work-related correspondence.
2. Official electronic documents shall be stored in the Intranet or Department Sites, or
other storage media provided by IT
3. External Party are responsible for the protection and management of documents
entrusted to them and should adhere to the standards and guidelines defined in the
Workplace Collaboration Standards and Guidelines and protected according to its data
classifications as defined by Legal.
4. External Party must use extreme caution when opening e-mail attachments received
from unknown senders, which may contain malware.
Password Protection
 External Party is prohibited from sharing personal password information and other authentication methods with
anyone.
 External Party shall ensure passwords conform to the standards defined (PFB)
 All passwords should meet or exceed the following characteristics ▪ Contain at least 8 alphanumeric characters. ▪
Contain both upper-case and lower-case letters. ▪ Contain at least one number (for example, 0-9). ▪ Contain at least
one special character (for example,!$%^&*()_+|~=`{}[]:";'<>?,/).
All passwords shall not have the following characteristics :
 Contain personal information such as birthdates, addresses, phone numbers, or names of family members, pets,
friends, and fantasy characters.
 Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321.
 You should never write down a password. Instead, try to create passwords that you can remember easily. One way to
do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase, "This May
Be One Way To Remember" could become the password TmB1w2R! or another variation.
 External Party must protect his/her password and shall not:
 Have passwords inserted into email messages, Alliance cases or other forms of electronic
communication.
 Reveal passwords over the phone to anyone.
 Hint at the format of a password (for example, "my family name").
 Share passwords with anyone, including administrative assistants, secretaries, managers, co-workers
while on vacation, and family members.
 Write passwords down and store them anywhere in your office or store passwords in a file on a
computer system or mobile devices (phone, tablet) without encryption.
 Use the "Remember Password" feature of applications (for example, web browsers).
Password Protection
Server Access Rights
 External Party to submit a system deployment plan and approved by
respective Application IT Manager.
 External Party shall install a remote access software for remote access to
Company IT Infrastructure.
 External Party shall only access from static IP(s). External Party shall provide
proof of ownership of the static IP(s) that will be accessing Company IT Asset
to IT for whitelisting.
 External Party access shall be restricted by time period, IPs, services
(ports/protocols) and monitored.
Thank you

More Related Content

What's hot

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossarythinkict
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 

What's hot (19)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
internet security
internet securityinternet security
internet security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Computer security
Computer securityComputer security
Computer security
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Computer security and
Computer security andComputer security and
Computer security and
 
1 security goals
1   security goals1   security goals
1 security goals
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 

Similar to Poicy 121

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Considering what you have learned, as well as using outside resource.pdf
Considering what you have learned, as well as using outside resource.pdfConsidering what you have learned, as well as using outside resource.pdf
Considering what you have learned, as well as using outside resource.pdfrohit219406
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxabhishekkumar807235
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 

Similar to Poicy 121 (20)

Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Considering what you have learned, as well as using outside resource.pdf
Considering what you have learned, as well as using outside resource.pdfConsidering what you have learned, as well as using outside resource.pdf
Considering what you have learned, as well as using outside resource.pdf
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Data security
 Data security  Data security
Data security
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
IT Policy
IT Policy IT Policy
IT Policy
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Poicy 121

  • 2. Computing, Software, Peripherals and related Devices  External Party shall ensure Computing Devices under his/her care are either switched off or protected with screensaver lock when he/she is not present within visible range of their computing device.  External Party shall ensure that Computing Devices are up-to-date as such it is their responsibility switch off / reboot their Computing Devices daily, to allow the updates of Computing Device’s OS, software, configuration and anti-virus definitions.  External Party shall not install or use software that are not approved by WRS IT. Please refer to Authorised Applications Standards.  External Party shall ensure that the Computing Devices that they use to access our network, asset & data have up-to-date patches, and anti-virus software with up- to-date definitions installed on the device. Anti-virus end-point protection need to be in the Gartner’s Magic Quadrant for End-Point protection.
  • 3. Network Access Rights  External Party must only use IT approved Network-enabled Devices to access Company IT Network; Personal Computing Devices are prohibited from accessing Company IT Network that are not accessible directly over the Internet.  External Party cannot bring and plug in personal Network-enabled Devices to Company IT Network without IT approval.  External Party shall ensure that their Computing Devices are adequately protected against virus and keyloggers when using their personal Computing Devices to access Company IT Assets that is available over Internet, not limited to Company Web Services (e.g. Administration) and Cloud Services (like Email / Intranet);
  • 4. Email / Electronic Documents / Collaboration Tools 1. External Party shall not use Company email for non-work-related correspondence. 2. Official electronic documents shall be stored in the Intranet or Department Sites, or other storage media provided by IT 3. External Party are responsible for the protection and management of documents entrusted to them and should adhere to the standards and guidelines defined in the Workplace Collaboration Standards and Guidelines and protected according to its data classifications as defined by Legal. 4. External Party must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
  • 5. Password Protection  External Party is prohibited from sharing personal password information and other authentication methods with anyone.  External Party shall ensure passwords conform to the standards defined (PFB)  All passwords should meet or exceed the following characteristics ▪ Contain at least 8 alphanumeric characters. ▪ Contain both upper-case and lower-case letters. ▪ Contain at least one number (for example, 0-9). ▪ Contain at least one special character (for example,!$%^&*()_+|~=`{}[]:";'<>?,/). All passwords shall not have the following characteristics :  Contain personal information such as birthdates, addresses, phone numbers, or names of family members, pets, friends, and fantasy characters.  Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321.  You should never write down a password. Instead, try to create passwords that you can remember easily. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase, "This May Be One Way To Remember" could become the password TmB1w2R! or another variation.
  • 6.  External Party must protect his/her password and shall not:  Have passwords inserted into email messages, Alliance cases or other forms of electronic communication.  Reveal passwords over the phone to anyone.  Hint at the format of a password (for example, "my family name").  Share passwords with anyone, including administrative assistants, secretaries, managers, co-workers while on vacation, and family members.  Write passwords down and store them anywhere in your office or store passwords in a file on a computer system or mobile devices (phone, tablet) without encryption.  Use the "Remember Password" feature of applications (for example, web browsers). Password Protection
  • 7. Server Access Rights  External Party to submit a system deployment plan and approved by respective Application IT Manager.  External Party shall install a remote access software for remote access to Company IT Infrastructure.  External Party shall only access from static IP(s). External Party shall provide proof of ownership of the static IP(s) that will be accessing Company IT Asset to IT for whitelisting.  External Party access shall be restricted by time period, IPs, services (ports/protocols) and monitored.