|
General Security Policy
|
bet | 2/6 | Sana | 01.04.2017 | Hajmi | 36 Kb. | | #2749 |
Users are to:
-
Use computer systems for solely corporate business purposes.
-
Maintain the privacy and confidentiality of all confidential and institutional data. (See Information Classification Section)
-
Use unique user-IDs and personal non-trivial secret passwords to access computer systems. Users are responsible for all activities occurring with their User-IDs.
-
Log out of all systems when leaving a computer system unattended.
-
Report information security violations immediately.
-
Adhere to virus control procedures. All software to be installed or downloaded from external sources through the Intranet or Internet must be screened with virus detection software before being invoked.
-
Refrain from connecting networked workstation to modems without approval. At no time should networked workstations be connected both to the Internet via a modem and to the company network.
-
Comply with all third-party software licenses. Any unlicensed software must be immediately removed from company computers.
|
| |