1 of 11

Slide Notes

DownloadGo Live

Security Procedures

Published on Nov 18, 2015

No Description

PRESENTATION OUTLINE

Security Procedures

Photo by deqalb

E-mail
Computer files & documents
Programs

- Important for business future
- would be damaged by unauthorized disclosure or misappropriation of mail, files, docs, programs
- keep confidential for legal requirements
eg: financial results
- careful also with USB-sticks !
- See confidentiality clause in your contract !

Metal & Cardboard Bins

- Metal bin for confidential info in the printing room.
- Cardboard or plastic bin for non-confidential info - spread around each floor.
Photo by Smabs Sputzer

Workplace Security
Badge

- 3 types of badges
- temporary badge returned every day
- used for security reason (not time clocking) --> swipe whenever floor change
- when forgotten, ask temporary one
- when lost, report in Security Tool (workspace DB)
-
Photo by reidab

No Tailgating

Photo by Zrendavir_

Call 21002

yearly Evacuation Drill
Emergencies such as fire, flooding, serious illness etc should be reported calling 21002 (see green sticker on your phones)

Yearly evacuation drill will be held.

Emergency Policy : https://ibm.biz/BdHjZK
Photo by eflon

Business Continuity

The aim is to have a structured plan to recover and reactivate key business operations.

It focuses on:
- people
- location
- thinkpads
- systems and tools

Contact:
- Daniele Sanna
- Maria Lara Paredes Crespo

https://connections.swg.usma.ibm.com/files/form/anonymous/api/library/c49c3...
Photo by brianjmatis

Thinkpad Security

  • Lock your computer
  • Lock your screen
  • Store it in your locker
  • Ask home office approval
- Lock your computer with the chain lock every day
-lock your screen (Ctrl+Alt+Supr) whenever you leaver your desk
- ask your manager for approval to work from home
- store your computer away in your locker when leaving the office
Photo by 端木月明

Clean Desk Policy

Your manager will check if no confidential or personal documents are left unprotected.
Photo by Earthworm

Things checked:

  • printings picked up
  • computer locked
  • screen locked
  • computer stored away
  • phone logged out
  • no paper left
- 1st time: 1-1 with manager, recorded in TR
- 2nd time: 1-1 with manager & 2nd liner, recorded in TR, action plan
3rd time: reported to center leader, strong action to be taken
Photo by unclesond

Untitled Slide

Photo by Stefan Baudy