Clear Screen

Clear Screen

Ref. No.: CPP-HR_0408_V1_Clear Screen
Prepared
C. Malay
01/27/2014
Approved
Execom
01/30/2014

1.0     Objective  
Clear Screen Policy aims to protect the confidentiality and integrity of all data in any information processing facility of the organization. 
 
2.0     Scope  
This policy shall apply to all team members.
 
3.0     Provisions   
3.1 Computers must be set to auto lock after a maximum of 5 minutes of non-use. 
3.2 Team members must log off from their computers whenever they leave their workstation by using the alt+ctrl+delete function or window key + l 
3.3 Team members must turn off their computers and monitors at the end of each work shift. 
3.4 Team members must save all files to the appropriate folder in the File Server and not store any files on the desktop hard disk.
3.5 Team members who use laptops must save all files to the appropriate folder in the server and are only allowed to store files on the laptop hard disk that are required for remote work. The laptops all have fully encrypted hard disk drives 
3.6 All desktops and laptops are preconfigured with the standard desktop and screensaver and team members must not change them. 
3.7 Encryption technologies must be implemented, whenever available, when sending private and confidential data. 
3.8 Audits, random and planned are conducted to ensure the implementation of this policy. 
4.0     Responsibility
4.1 IT Team is responsible for installing encryption technology on all IT mobile infrastructures. 
4.2 Internal Auditors are responsible for conducting random audits to ensure this policy is enforced. 
4.3 Any immediate superiors or ISO Team members must report any violation. 
5.0     Frequency
            n/a
 
6.0     Distribution
            n/a

7.0     Usage  
            n/a
 
8.0     References  
8.1  ISO 19011:2004 Guidelines for Quality and/or Environmental Management Systems Auditing 
8.2  ISO/IEC 27001:2006 (ISO/IEC published 2005) Information Technology – Security Techniques – Information security management systems – Requirements 
8.3 ISO/IEC 17799:2006 (ISO/IEC published 2005) Information Technology – Security Techniques Code of Practice for information Security management 
8.4 Table of Offenses 
8.5 Code of Conduct 
9.0     Records
Records of Violation 
Disciplinary Letters 
    • Related Articles

    • Table of Offenses

      ACTS AGAINST GOOD CONDUCT AND BEHAVIOR Degree of Sanction Rule Infraction Category Definition 1st 2nd 3rd 4th 1 Professional Conduct and Workplace Behavior Discourtesy and Use of Disrespectful Language Discourtesy, insult, malicious or vicious ...
    • Global Anti-Bribery and Corruption Policy

      Ref. No.: CPP-HR-0701_Global_Anti_Bribery_Policy Prepared P. Keegan 03/01/2020 Approved ELT 08/05/2020 OUR COMMITMENT TO ETHICAL BUSINESS Infinit-O Global, Limited (IOG) is committed to ethical business. It is part of who we are. IOG’s Policy is ...
    • Teleworking and Mobile Device Policy

      Ref. No.: CPP-IT-0203_V1_Teleworking and Mobile Device Policy.doc  Prepared W. Cundangan 09/21/2015 Approved R. Tan 09/22/2015 1.0 Objective   The purpose of these policy is to ensure that security of information and systems, accessed through ...
    • IO Leader Handbook

      IOM Leader Handbook Version 1.0 July 2020 1. Introduction This Leader Handbook is not a “how to manage people”, rather it’s a quick reference so Leaders would  know what’s expected of them in various aspects of managing team members. 2. Our Leader ...
    • Company Engineering Principles for IT

      Ref. No.: CPP-IT-0301_V1_Company Engineering Principles for Information Technology.doc Company Engineering Principles for Information Technology.doc  Prepared W. Cundangan 05/17/2016 Approved R. Eldridge 05/01/2017 1.0 Objective  The purpose of the ...