SlideShare a Scribd company logo
1 of 9
POICY
COMPUTING, SOFTWARE,
PERIPHERALS AND RELATED
DEVICES
External Party shall ensure Computing Devices under his/her care are
either switched off or protected with screensaver lock when he/she is
not present within visible range of their computing device.
External Party shall ensure that Computing Devices are up-to-date as
such it is their responsibility switch off / reboot their Computing
Devices daily, to allow the updates of Computing Device’s OS,
software, configuration and anti-virus definitions.
External Party shall not install or use software that are not approved
by WRS IT. Please refer to Authorised Applications Standards.
External Party shall ensure that the Computing Devices that they use
to access our network, asset & data have up-to-date patches, and
anti-virus software with up-to-date definitions installed on the
device. Anti-virus end-point protection need to be in the Gartner’s
Magic Quadrant for End-Point protection.
NETWORK ACCESS RIGHTS
External Party must only use IT approved Network-enabled Devices to access Company IT Network; Personal
Computing Devices are prohibited from accessing Company IT Network that are not accessible directly over
the Internet.
External Party cannot bring and plug in personal Network-enabled Devices to Company IT Network without IT
approval.
External Party shall ensure that their Computing Devices are adequately protected against virus and
keyloggers when using their personal Computing Devices to access Company IT Assets that is available over
Internet, not limited to Company Web Services (e.g. Administration) and Cloud Services (like Email / Intranet);
REMOTE ACCESS POLICY
Secure remote access must be strictly controlled. Control will be
enforced by two factor authentication via one-time password
authentication or public/private keys with strong passphrases
Vendor accounts with access to the company network will only be
enabled during the time period the access is required and will be
disabled or removed once access is no longer required.
Remote access connection will be setup to be disconnected
automatically after 30 minutes of inactivity
All hosts that are connected to the Company internal networks via
remote access technologies will be monitored on a regular basis.
EMAIL / ELECTRONIC DOCUMENTS / COLLABORATION TOOLS
1. External Party shall not use Company email for non-work-related correspondence.
2. Official electronic documents shall be stored in the Intranet or Department Sites, or other
storage media provided by IT
3. External Party are responsible for the protection and management of documents entrusted to
them and should adhere to the standards and guidelines defined in the Workplace
Collaboration Standards and Guidelines and protected according to its data classifications as
defined by Legal.
4. External Party must use extreme caution when opening e-mail attachments received from
unknown senders, which may contain malware.
PASSWORD PROTECTION
External Party is prohibited from sharing personal password information and other authentication methods with anyone.
External Party shall ensure passwords conform to the standards defined (PFB)
All passwords should meet or exceed the following characteristics ▪ Contain at least 8 alphanumeric characters. ▪ Contain both
upper-case and lower-case letters. ▪ Contain at least one number (for example, 0-9). ▪ Contain at least one special character
(for example,!$%^&*()_+|~=`{}[]:";'<>?,/).
All passwords shall not have the following characteristics :
Contain personal information such as birthdates, addresses, phone numbers, or names of family members, pets, friends, and
fantasy characters.
Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321.
You should never write down a password. Instead, try to create passwords that you can remember easily. One way to do this is
create a password based on a song title, affirmation, or other phrase. For example, the phrase, "This May Be One Way To
Remember" could become the password TmB1w2R! or another variation.
PASSWORD PROTECTION
External Party must protect his/her password and shall not:
Have passwords inserted into email messages, Alliance cases or other forms of electronic
communication.
Reveal passwords over the phone to anyone.
Hint at the format of a password (for example, "my family name").
Share passwords with anyone, including administrative assistants, secretaries, managers, co-workers
while on vacation, and family members.
Write passwords down and store them anywhere in your office or store passwords in a file on a
computer system or mobile devices (phone, tablet) without encryption.
Use the "Remember Password" feature of applications (for example, web browsers).
SERVER ACCESS RIGHTS
External Party to submit a system deployment plan and approved by
respective Application IT Manager.
External Party shall install a remote access software for remote access
to Company IT Infrastructure.
External Party shall only access from static IP(s). External Party shall
provide proof of ownership of the static IP(s) that will be accessing
Company IT Asset to IT for whitelisting.
External Party access shall be restricted by time period, IPs, services
(ports/protocols) and monitored.
Thank you

More Related Content

What's hot

02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity OnlineJon Loyd
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - SecurityRobin Hastings
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaWikki Verma
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Auditing Archives: The Case of the File Sharing Franchisee
Auditing Archives: The Case of the File Sharing FranchiseeAuditing Archives: The Case of the File Sharing Franchisee
Auditing Archives: The Case of the File Sharing FranchiseeSecurityMetrics
 

What's hot (15)

System security
System securitySystem security
System security
 
Cyber security
Cyber securityCyber security
Cyber security
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Email threats
Email threatsEmail threats
Email threats
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
new
newnew
new
 
Mohini_experience
Mohini_experienceMohini_experience
Mohini_experience
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Auditing Archives: The Case of the File Sharing Franchisee
Auditing Archives: The Case of the File Sharing FranchiseeAuditing Archives: The Case of the File Sharing Franchisee
Auditing Archives: The Case of the File Sharing Franchisee
 

Similar to Poicy 121

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxabhishekkumar807235
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policyJigyanshu Jangid
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicRandolph Novino
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similar to Poicy 121 (20)

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policy
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 Infographic
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Poicy 121

  • 2. COMPUTING, SOFTWARE, PERIPHERALS AND RELATED DEVICES External Party shall ensure Computing Devices under his/her care are either switched off or protected with screensaver lock when he/she is not present within visible range of their computing device. External Party shall ensure that Computing Devices are up-to-date as such it is their responsibility switch off / reboot their Computing Devices daily, to allow the updates of Computing Device’s OS, software, configuration and anti-virus definitions. External Party shall not install or use software that are not approved by WRS IT. Please refer to Authorised Applications Standards. External Party shall ensure that the Computing Devices that they use to access our network, asset & data have up-to-date patches, and anti-virus software with up-to-date definitions installed on the device. Anti-virus end-point protection need to be in the Gartner’s Magic Quadrant for End-Point protection.
  • 3. NETWORK ACCESS RIGHTS External Party must only use IT approved Network-enabled Devices to access Company IT Network; Personal Computing Devices are prohibited from accessing Company IT Network that are not accessible directly over the Internet. External Party cannot bring and plug in personal Network-enabled Devices to Company IT Network without IT approval. External Party shall ensure that their Computing Devices are adequately protected against virus and keyloggers when using their personal Computing Devices to access Company IT Assets that is available over Internet, not limited to Company Web Services (e.g. Administration) and Cloud Services (like Email / Intranet);
  • 4. REMOTE ACCESS POLICY Secure remote access must be strictly controlled. Control will be enforced by two factor authentication via one-time password authentication or public/private keys with strong passphrases Vendor accounts with access to the company network will only be enabled during the time period the access is required and will be disabled or removed once access is no longer required. Remote access connection will be setup to be disconnected automatically after 30 minutes of inactivity All hosts that are connected to the Company internal networks via remote access technologies will be monitored on a regular basis.
  • 5. EMAIL / ELECTRONIC DOCUMENTS / COLLABORATION TOOLS 1. External Party shall not use Company email for non-work-related correspondence. 2. Official electronic documents shall be stored in the Intranet or Department Sites, or other storage media provided by IT 3. External Party are responsible for the protection and management of documents entrusted to them and should adhere to the standards and guidelines defined in the Workplace Collaboration Standards and Guidelines and protected according to its data classifications as defined by Legal. 4. External Party must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
  • 6. PASSWORD PROTECTION External Party is prohibited from sharing personal password information and other authentication methods with anyone. External Party shall ensure passwords conform to the standards defined (PFB) All passwords should meet or exceed the following characteristics ▪ Contain at least 8 alphanumeric characters. ▪ Contain both upper-case and lower-case letters. ▪ Contain at least one number (for example, 0-9). ▪ Contain at least one special character (for example,!$%^&*()_+|~=`{}[]:";'<>?,/). All passwords shall not have the following characteristics : Contain personal information such as birthdates, addresses, phone numbers, or names of family members, pets, friends, and fantasy characters. Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321. You should never write down a password. Instead, try to create passwords that you can remember easily. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase, "This May Be One Way To Remember" could become the password TmB1w2R! or another variation.
  • 7. PASSWORD PROTECTION External Party must protect his/her password and shall not: Have passwords inserted into email messages, Alliance cases or other forms of electronic communication. Reveal passwords over the phone to anyone. Hint at the format of a password (for example, "my family name"). Share passwords with anyone, including administrative assistants, secretaries, managers, co-workers while on vacation, and family members. Write passwords down and store them anywhere in your office or store passwords in a file on a computer system or mobile devices (phone, tablet) without encryption. Use the "Remember Password" feature of applications (for example, web browsers).
  • 8. SERVER ACCESS RIGHTS External Party to submit a system deployment plan and approved by respective Application IT Manager. External Party shall install a remote access software for remote access to Company IT Infrastructure. External Party shall only access from static IP(s). External Party shall provide proof of ownership of the static IP(s) that will be accessing Company IT Asset to IT for whitelisting. External Party access shall be restricted by time period, IPs, services (ports/protocols) and monitored.