General Security Policy




Download 36 Kb.
bet2/6
Sana01.04.2017
Hajmi36 Kb.
#2749
1   2   3   4   5   6

General Security Policy


Users are to:

  • Use computer systems for solely corporate business purposes.

  • Maintain the privacy and confidentiality of all confidential and institutional data. (See Information Classification Section)

  • Use unique user-IDs and personal non-trivial secret passwords to access computer systems. Users are responsible for all activities occurring with their User-IDs.

  • Log out of all systems when leaving a computer system unattended.

  • Report information security violations immediately.

  • Adhere to virus control procedures. All software to be installed or downloaded from external sources through the Intranet or Internet must be screened with virus detection software before being invoked.

  • Refrain from connecting networked workstation to modems without approval. At no time should networked workstations be connected both to the Internet via a modem and to the company network.

  • Comply with all third-party software licenses. Any unlicensed software must be immediately removed from company computers.




Download 36 Kb.
1   2   3   4   5   6




Download 36 Kb.