SlideShare a Scribd company logo
Clean Desk Policy
FOR YOUR EYES ONLY
Clean Desk Policy: Definition
 A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their
working space when they leave the office. Most Clean Desk Policies require employees to clear
their desks of all papers at the end of the day.
Why a Clean Desk Policy? (For Your Eyes
Only)
 Today, CDPs are increasingly being motivated by information security compliance regulations
such as ISO 27001 and the Data Protection Act.
 Sensitive information must be protected at all times from anyone who may pass by including
other employees, cleaners, and office visitors
 the most important reason today for a clean desk policy is information security
 Desks should be cleared of all papers including post-it notes, paper with sensitive information
such as account numbers, and non-essential documents. The policy also pertains to sensitive
information on computers.
 In effect, a clean desk policy is one of the simplest ways to protect sensitive information and to
reduce the risk of a data breach and identity theft.
 A clean desk policy also complies with information security regulations. In the U.S., federal privacy
laws include FACTA, HIPAA/HITECH, Gramm Leach Bliley and Sarbanes Oxley.
3 Good Reasons to be Compliant
 Open Space: This means some protective layers have been taken out, making the information on your
desk more vulnerable to inappropriate access from prying eyes. To recreate your individual security layers,
by logging off from your desktop computer, and by locking away all valuables and confidential
information carriers.
 Clients should matter (its not about you): Your company’s clients’, employees and other stakeholders have
the right to assume that their confidential data are in safe hands and the accessibility of the cleaning lady
should also be limited.
 Innovation is the Name of the Game: There is a worldwide struggle between innovators and imitators,
between vanguard and the followers, between visionaries and conventionalists. The new era product
development and innovation come at a great expense to those companies that are brave enough to take
on path of difference and understand that all approaches must be virtually seamless.
How to Implement a Clean Desk Policy
 To be effective, a CDP should be in writing with clear instructions for what actions the employee is supposed to take. Like an acceptable use
policy (AUP), the CDP should be a signed contract that outlines what is expected of the employee, what is expected of the employer, who is
responsible for monitoring the success of the policy, how monitoring will be done and what the consequences will be for policy non-
compliance.
 The primary reason for a clean desk policy is that it creates a positive company image when customers visit your place of business. It also
reduces the likelihood that sensitive or confidential materials can be compromised.
 Like any policy, a policy to encourage clean desks only works if it is enforced. Management will have to come to an agreement as to
disciplinary action necessary if the policy is not adhered to and balance their approach with flexibility. One last thing to mention is that if
you except the policy to work, employees will need to have time in their day to deal with clearing paperwork from their desk. If you think
this may be an issue, it is best to build a plan to make the time into your policy.
 Once your desk is clean, keeping it tidy and organized is easier if you follow these steps each day:
 Set aside a planned time each day to clear paperwork from your desk.
 Paperwork builds up just like junk mail at home when you don't deal with it daily. Don't keep papers you don't need. Strive to handle
papers as few times if possible. If you're cleaning your desk, file papers in the proper file or into the trash bin. Shred any papers of a
sensitive nature.
 Don't print emails to read them. All it does is turn into clutter.
 Deal with cleaning your desk before you leave for the day so that you start the next workday with a clean desk and documents in their
proper place.
 Scan documents when possible and store them on your computer using paper filing software. This eliminates paper filing and makes
documents easier to find no matter who is looking for them.
Clean Desk Policy: Benefits
 There are a number of positive results from initiating such a policy and these results affect the entire workplace.
These positives include items such as:
• It creates the right image when customers and vendors visit your company
• It reduces the chance of confidential information being compromised or passwords being stolen.
• Employee stress is lessened when an employee's desk is clean. Studies show that people with a messy desk waste 15
percent of their time looking for things.
• The occurrence of workplace accidents and spills drops when a policy supporting clean desks is enforced.
• People who keep a tidy desk are often considered for a raise because of their organizational skills.
• Overall, the perception of a clean desk is one of efficiency and a well organized office.
• Cost savings: Another benefit of following clean desk guidelines is that it helps reduce the amount of paper used and
along with that the amount of toner used in printers and copiers. Why? Because employees can find what they're
looking for which eliminates the need to print off additional copies.
Clean Desk Policy
Q&A:

More Related Content

What's hot

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
ISO 27001
ISO 27001ISO 27001
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
SAROJ BEHERA
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
Angela Samuels
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
Julia Urbina-Pineda
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
rainrjcahili
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
PECB
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 

What's hot (20)

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 

Viewers also liked

The Workspaces of Buffer
The Workspaces of BufferThe Workspaces of Buffer
The Workspaces of Buffer
Buffer
 
Clean Up Your Desk
Clean Up Your DeskClean Up Your Desk
Clean Up Your Desk
David Deubelbeiss
 
Daily 15 minute office 5S
Daily 15 minute office 5SDaily 15 minute office 5S
Daily 15 minute office 5S
Vivek Naik
 
Group presentation for Information Security Class.
Group presentation for Information Security Class.Group presentation for Information Security Class.
Group presentation for Information Security Class.
Ashley Clark
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Donna Koger
 
Biografía de quino
Biografía de quinoBiografía de quino
Biografía de quinocynduta1810
 
Coso Internal Control Integrated Framework
Coso Internal Control Integrated FrameworkCoso Internal Control Integrated Framework
Coso Internal Control Integrated Framework
hyesue
 
Cobit dan coso
Cobit dan cosoCobit dan coso
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Hr policies
Hr policiesHr policies
Hr policies
Pratibha Mishra
 

Viewers also liked (12)

The Workspaces of Buffer
The Workspaces of BufferThe Workspaces of Buffer
The Workspaces of Buffer
 
Clean Up Your Desk
Clean Up Your DeskClean Up Your Desk
Clean Up Your Desk
 
Daily 15 minute office 5S
Daily 15 minute office 5SDaily 15 minute office 5S
Daily 15 minute office 5S
 
Group presentation for Information Security Class.
Group presentation for Information Security Class.Group presentation for Information Security Class.
Group presentation for Information Security Class.
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
200808 01
200808 01200808 01
200808 01
 
Biografía de quino
Biografía de quinoBiografía de quino
Biografía de quino
 
Coso Internal Control Integrated Framework
Coso Internal Control Integrated FrameworkCoso Internal Control Integrated Framework
Coso Internal Control Integrated Framework
 
Biografia de quino
Biografia de quinoBiografia de quino
Biografia de quino
 
Cobit dan coso
Cobit dan cosoCobit dan coso
Cobit dan coso
 
Information security management
Information security managementInformation security management
Information security management
 
Hr policies
Hr policiesHr policies
Hr policies
 

Similar to Clean Desk Policy

How To Start A Shred All Policy at Work
How To Start A Shred All Policy at WorkHow To Start A Shred All Policy at Work
How To Start A Shred All Policy at WorkMatt Shafer, CISP
 
Managing Business Expenses in the Cloud
Managing Business Expenses in the CloudManaging Business Expenses in the Cloud
Managing Business Expenses in the Cloud
SimonAllsop3
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
Canon Business CEE
 
Assignment for paperless life
Assignment for paperless lifeAssignment for paperless life
Assignment for paperless life
Tauhidul Khandaker
 
Compliance as Culture Strategy
Compliance as Culture StrategyCompliance as Culture Strategy
Compliance as Culture Strategy
Cornerstone OnDemand
 
Getting to Paperlite: Strategies for More Efficient Records Management Part 1
Getting to Paperlite: Strategies for More Efficient Records Management Part 1Getting to Paperlite: Strategies for More Efficient Records Management Part 1
Getting to Paperlite: Strategies for More Efficient Records Management Part 1
TAB
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's Success
Everteam
 
ADP_Outsourcing_Guide_English
ADP_Outsourcing_Guide_EnglishADP_Outsourcing_Guide_English
ADP_Outsourcing_Guide_EnglishJDClarity
 
8 Wastes of LEAN Construction
8 Wastes of LEAN Construction8 Wastes of LEAN Construction
8 Wastes of LEAN Construction
McKenney's Inc
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
Everteam
 
Computer systems management lecture 03
Computer systems management lecture 03Computer systems management lecture 03
Computer systems management lecture 03
RAJABU ISSA
 
Why records management
Why records managementWhy records management
Why records managementOMWOMA JACKSON
 
Making enterprise mobility a success.
Making enterprise mobility a success.Making enterprise mobility a success.
Making enterprise mobility a success.
Olive Communications
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is importantOMWOMA JACKSON
 
Canon for Business - Where paper meets digital
Canon for Business -  Where paper meets digitalCanon for Business -  Where paper meets digital
Canon for Business - Where paper meets digital
Canon Belgium
 
Streamlining information and document management
Streamlining information and document managementStreamlining information and document management
Streamlining information and document management
Canon Belgium
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
IT-Toolkits.org
 
10 Things Competencies
10 Things Competencies10 Things Competencies
10 Things Competencies
jothisekaran
 
10 steps to implement edms
10 steps to implement edms10 steps to implement edms
10 steps to implement edms
LogicalDOC
 

Similar to Clean Desk Policy (20)

How To Start A Shred All Policy at Work
How To Start A Shred All Policy at WorkHow To Start A Shred All Policy at Work
How To Start A Shred All Policy at Work
 
Managing Business Expenses in the Cloud
Managing Business Expenses in the CloudManaging Business Expenses in the Cloud
Managing Business Expenses in the Cloud
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 
Assignment for paperless life
Assignment for paperless lifeAssignment for paperless life
Assignment for paperless life
 
IG-101
IG-101IG-101
IG-101
 
Compliance as Culture Strategy
Compliance as Culture StrategyCompliance as Culture Strategy
Compliance as Culture Strategy
 
Getting to Paperlite: Strategies for More Efficient Records Management Part 1
Getting to Paperlite: Strategies for More Efficient Records Management Part 1Getting to Paperlite: Strategies for More Efficient Records Management Part 1
Getting to Paperlite: Strategies for More Efficient Records Management Part 1
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's Success
 
ADP_Outsourcing_Guide_English
ADP_Outsourcing_Guide_EnglishADP_Outsourcing_Guide_English
ADP_Outsourcing_Guide_English
 
8 Wastes of LEAN Construction
8 Wastes of LEAN Construction8 Wastes of LEAN Construction
8 Wastes of LEAN Construction
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
Computer systems management lecture 03
Computer systems management lecture 03Computer systems management lecture 03
Computer systems management lecture 03
 
Why records management
Why records managementWhy records management
Why records management
 
Making enterprise mobility a success.
Making enterprise mobility a success.Making enterprise mobility a success.
Making enterprise mobility a success.
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is important
 
Canon for Business - Where paper meets digital
Canon for Business -  Where paper meets digitalCanon for Business -  Where paper meets digital
Canon for Business - Where paper meets digital
 
Streamlining information and document management
Streamlining information and document managementStreamlining information and document management
Streamlining information and document management
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
10 Things Competencies
10 Things Competencies10 Things Competencies
10 Things Competencies
 
10 steps to implement edms
10 steps to implement edms10 steps to implement edms
10 steps to implement edms
 

Clean Desk Policy

  • 1. Clean Desk Policy FOR YOUR EYES ONLY
  • 2. Clean Desk Policy: Definition  A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most Clean Desk Policies require employees to clear their desks of all papers at the end of the day.
  • 3. Why a Clean Desk Policy? (For Your Eyes Only)  Today, CDPs are increasingly being motivated by information security compliance regulations such as ISO 27001 and the Data Protection Act.  Sensitive information must be protected at all times from anyone who may pass by including other employees, cleaners, and office visitors  the most important reason today for a clean desk policy is information security  Desks should be cleared of all papers including post-it notes, paper with sensitive information such as account numbers, and non-essential documents. The policy also pertains to sensitive information on computers.  In effect, a clean desk policy is one of the simplest ways to protect sensitive information and to reduce the risk of a data breach and identity theft.  A clean desk policy also complies with information security regulations. In the U.S., federal privacy laws include FACTA, HIPAA/HITECH, Gramm Leach Bliley and Sarbanes Oxley.
  • 4. 3 Good Reasons to be Compliant  Open Space: This means some protective layers have been taken out, making the information on your desk more vulnerable to inappropriate access from prying eyes. To recreate your individual security layers, by logging off from your desktop computer, and by locking away all valuables and confidential information carriers.  Clients should matter (its not about you): Your company’s clients’, employees and other stakeholders have the right to assume that their confidential data are in safe hands and the accessibility of the cleaning lady should also be limited.  Innovation is the Name of the Game: There is a worldwide struggle between innovators and imitators, between vanguard and the followers, between visionaries and conventionalists. The new era product development and innovation come at a great expense to those companies that are brave enough to take on path of difference and understand that all approaches must be virtually seamless.
  • 5. How to Implement a Clean Desk Policy  To be effective, a CDP should be in writing with clear instructions for what actions the employee is supposed to take. Like an acceptable use policy (AUP), the CDP should be a signed contract that outlines what is expected of the employee, what is expected of the employer, who is responsible for monitoring the success of the policy, how monitoring will be done and what the consequences will be for policy non- compliance.  The primary reason for a clean desk policy is that it creates a positive company image when customers visit your place of business. It also reduces the likelihood that sensitive or confidential materials can be compromised.  Like any policy, a policy to encourage clean desks only works if it is enforced. Management will have to come to an agreement as to disciplinary action necessary if the policy is not adhered to and balance their approach with flexibility. One last thing to mention is that if you except the policy to work, employees will need to have time in their day to deal with clearing paperwork from their desk. If you think this may be an issue, it is best to build a plan to make the time into your policy.  Once your desk is clean, keeping it tidy and organized is easier if you follow these steps each day:  Set aside a planned time each day to clear paperwork from your desk.  Paperwork builds up just like junk mail at home when you don't deal with it daily. Don't keep papers you don't need. Strive to handle papers as few times if possible. If you're cleaning your desk, file papers in the proper file or into the trash bin. Shred any papers of a sensitive nature.  Don't print emails to read them. All it does is turn into clutter.  Deal with cleaning your desk before you leave for the day so that you start the next workday with a clean desk and documents in their proper place.  Scan documents when possible and store them on your computer using paper filing software. This eliminates paper filing and makes documents easier to find no matter who is looking for them.
  • 6. Clean Desk Policy: Benefits  There are a number of positive results from initiating such a policy and these results affect the entire workplace. These positives include items such as: • It creates the right image when customers and vendors visit your company • It reduces the chance of confidential information being compromised or passwords being stolen. • Employee stress is lessened when an employee's desk is clean. Studies show that people with a messy desk waste 15 percent of their time looking for things. • The occurrence of workplace accidents and spills drops when a policy supporting clean desks is enforced. • People who keep a tidy desk are often considered for a raise because of their organizational skills. • Overall, the perception of a clean desk is one of efficiency and a well organized office. • Cost savings: Another benefit of following clean desk guidelines is that it helps reduce the amount of paper used and along with that the amount of toner used in printers and copiers. Why? Because employees can find what they're looking for which eliminates the need to print off additional copies.