SlideShare a Scribd company logo
Clean Desk Policy

      1. Overview
            a. The purpose for this policy is to establish a culture of security and trust
                for all employees at <company>. An effective clean desk effort
                involving the participation and support of all <Company Name>
                employees can greatly protect paper documents that contain sensitive
                information about our clients, customers and vendors. All employees
                should familiarize themselves with the guidelines of this policy.
      2. Purpose
            a. The main reasons for a clean desk policy are:
                     i. A clean desk can produce a positive image when our customers
                         visit the company.
                    ii. It reduces the threat of a security incident as confidential
                         information will be locked away when unattended.
                   iii. Sensitive documents left in the open can be stolen by a
                         malicious entity.
      3. Responsibility
            a. All staff, employees and entities working on behalf of <company> are
                subject to this policy
      4. Scope
            a. At known extended periods away from your desk, such as a lunch
                break, sensitive working papers are expected to be placed in locked
                drawers.
            b. At the end of the working day the employee is expected to tidy their
                desk and to put away all office papers. <Company> provides locking
                desks and filing cabinets for this purpose.
      5. Action
            a. Allocate time in your calendar to clear away your paperwork.
            b. Always clear your workspace before leaving for longer periods of
                time.
            c. If in doubt - throw it out. If you are unsure of whether a duplicate
                piece of sensitive documentation should be kept - it will probably be
                better to place it in the shred bin.
            d. Consider scanning paper items and filing them electronically in your
                workstation.
            e. Use the recycling bins for sensitive documents when they are no
                longer needed.
            f. Lock your desk and filing cabinets at the end of the day
            g. Lock away portable computing devices such as laptops or PDA
                devices
            h. Treat mass storage devices such as CDROM, DVD or USB drives as
                sensitive and secure them in a locked drawer
      6. Enforcement
            a. Any employee found to have violated this policy may be subject to
                disciplinary action, up to and including termination of employment.
7. Revision History
      a. Policy is in effect on <date>
      b. Document revised on <date>

More Related Content

Similar to 200808 01

Record Storage and Management
Record Storage and ManagementRecord Storage and Management
Record Storage and Management
Shred Nations
 
E Bryan Information Security Management Protecting Your Assets
E  Bryan   Information Security Management   Protecting Your AssetsE  Bryan   Information Security Management   Protecting Your Assets
E Bryan Information Security Management Protecting Your Assets
Emerson Bryan
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of Information
Musselburgh Grammar School
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
Brijesh Joshi
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
ESDS Software Solution Pvt. Ltd
 
Tweed nbn presentation
Tweed nbn presentationTweed nbn presentation
Tweed nbn presentation
Workforce BluePrint
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
CooperTechnologiesInc
 
TCUK 2013 - Adrian Morse - The challenges of remote management
TCUK 2013 - Adrian Morse - The challenges of remote managementTCUK 2013 - Adrian Morse - The challenges of remote management
TCUK 2013 - Adrian Morse - The challenges of remote management
TCUK Conference
 
Lifecycle of a Document
Lifecycle of a Document Lifecycle of a Document
Lifecycle of a Document
Shred-it
 
SIX points to make the workplace safe
SIX points to make the workplace safeSIX points to make the workplace safe
SIX points to make the workplace safe
ralphbuschow
 
Clmd4 a frontservicesg7_8
Clmd4 a frontservicesg7_8Clmd4 a frontservicesg7_8
Clmd4 a frontservicesg7_8
marilynbristol3
 
Archiving documents mes hybrid
Archiving documents   mes hybridArchiving documents   mes hybrid
Archiving documents mes hybrid
MES Hybrid
 
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
Janey (Jaye) Pritchett
 
Confidential information and registered designs in singapore
Confidential information and registered designs in singaporeConfidential information and registered designs in singapore
Confidential information and registered designs in singapore
Benjamin Ck Ang
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and Workflow
Virtu Institute
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 
Protecting Your Firm
Protecting Your FirmProtecting Your Firm
Protecting Your Firm
Oregon Law Practice Management
 
Interior Designer Office
Interior Designer OfficeInterior Designer Office
Interior Designer Office
siriajadhav17
 
INTERIOR DESIGNER OFFICE
INTERIOR DESIGNER OFFICEINTERIOR DESIGNER OFFICE
INTERIOR DESIGNER OFFICE
sirriajadhav001
 

Similar to 200808 01 (20)

Record Storage and Management
Record Storage and ManagementRecord Storage and Management
Record Storage and Management
 
E Bryan Information Security Management Protecting Your Assets
E  Bryan   Information Security Management   Protecting Your AssetsE  Bryan   Information Security Management   Protecting Your Assets
E Bryan Information Security Management Protecting Your Assets
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of Information
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Tweed nbn presentation
Tweed nbn presentationTweed nbn presentation
Tweed nbn presentation
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
TCUK 2013 - Adrian Morse - The challenges of remote management
TCUK 2013 - Adrian Morse - The challenges of remote managementTCUK 2013 - Adrian Morse - The challenges of remote management
TCUK 2013 - Adrian Morse - The challenges of remote management
 
Lifecycle of a Document
Lifecycle of a Document Lifecycle of a Document
Lifecycle of a Document
 
SIX points to make the workplace safe
SIX points to make the workplace safeSIX points to make the workplace safe
SIX points to make the workplace safe
 
Clmd4 a frontservicesg7_8
Clmd4 a frontservicesg7_8Clmd4 a frontservicesg7_8
Clmd4 a frontservicesg7_8
 
Archiving documents mes hybrid
Archiving documents   mes hybridArchiving documents   mes hybrid
Archiving documents mes hybrid
 
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
DOCSKC-_566159-v1-Outline_for_Best_Practices_-_How_Administrative_Assistants_...
 
Confidential information and registered designs in singapore
Confidential information and registered designs in singaporeConfidential information and registered designs in singapore
Confidential information and registered designs in singapore
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and Workflow
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Protecting Your Firm
Protecting Your FirmProtecting Your Firm
Protecting Your Firm
 
Interior Designer Office
Interior Designer OfficeInterior Designer Office
Interior Designer Office
 
INTERIOR DESIGNER OFFICE
INTERIOR DESIGNER OFFICEINTERIOR DESIGNER OFFICE
INTERIOR DESIGNER OFFICE
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

200808 01

  • 1. Clean Desk Policy 1. Overview a. The purpose for this policy is to establish a culture of security and trust for all employees at <company>. An effective clean desk effort involving the participation and support of all <Company Name> employees can greatly protect paper documents that contain sensitive information about our clients, customers and vendors. All employees should familiarize themselves with the guidelines of this policy. 2. Purpose a. The main reasons for a clean desk policy are: i. A clean desk can produce a positive image when our customers visit the company. ii. It reduces the threat of a security incident as confidential information will be locked away when unattended. iii. Sensitive documents left in the open can be stolen by a malicious entity. 3. Responsibility a. All staff, employees and entities working on behalf of <company> are subject to this policy 4. Scope a. At known extended periods away from your desk, such as a lunch break, sensitive working papers are expected to be placed in locked drawers. b. At the end of the working day the employee is expected to tidy their desk and to put away all office papers. <Company> provides locking desks and filing cabinets for this purpose. 5. Action a. Allocate time in your calendar to clear away your paperwork. b. Always clear your workspace before leaving for longer periods of time. c. If in doubt - throw it out. If you are unsure of whether a duplicate piece of sensitive documentation should be kept - it will probably be better to place it in the shred bin. d. Consider scanning paper items and filing them electronically in your workstation. e. Use the recycling bins for sensitive documents when they are no longer needed. f. Lock your desk and filing cabinets at the end of the day g. Lock away portable computing devices such as laptops or PDA devices h. Treat mass storage devices such as CDROM, DVD or USB drives as sensitive and secure them in a locked drawer 6. Enforcement a. Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
  • 2. 7. Revision History a. Policy is in effect on <date> b. Document revised on <date>