2.0 Scope
This policy shall apply to all team members.
Reactivating a locked device must require strong user authentication (e.g., a strong password, PIN, biometric, or token). Passwords or access credentials must never be posted on or near the screen or device.
Team members must ensure to clear their Recycle Bin for Windows or Trash for Mac/iOS respectively whenever possible to maintain system efficiency and ensure compliance with data security protocols.
Vice presidents and Directors are responsible for ensuring that all staff and managers are aware of security policies and that they are observed. Managers need to be aware they have a responsibility to ensure staff have sufficient, relevant knowledge concerning the security of information and systems. Designated owners of systems, who have responsibility for the management of systems and inherent information, need to ensure that staff have been made aware of their responsibilities toward security. Designated owners of systems and information need to ensure they uphold the security policies and procedures.
The IT Team is responsible for installing encryption technology on all IT mobile infrastructures.
Internal Auditors are responsible for conducting random audits to ensure this policy is enforced.
Any immediate superiors or ISO Team members must report any violation.
5.0 Breach of Policy
5.1 Breaches of this policy and/or security incidents can be defined as events which could have, or have resulted in, loss or damage to company assets, or an event which is in breach of the company’s security procedures and policies. All company employees, partner agencies, Third Parties and vendors have a responsibility to report security incidents and breaches of this policy immediately through the company’s QISMS reporting system (third parties, partners or vendors may relay the report to their direct contact. This obligation also extends to any external organization contracted to support or access the Information Systems of the Company.
5.2 The Company will take appropriate measures to remedy any breach of the policy and its associated procedures and guidelines will be dealt with under the disciplinary procedures.
6.0 Distribution
Team Members
Team Leaders/ Managers/Directors
Execom
7.0 Usage – n/a
ISO 19011:2011 Guidelines for Quality and/or Environmental Management Systems Auditing
ISO/IEC 27001:2013 Information Technology – Security Techniques – Information security management systems – Requirements
ISO/IEC 17799:2005 Information Technology – Security Techniques Code of Practice for information Security management
Table of Offenses
Code of Conduct
Records of Violation
Disciplinary Letter