You can find our Acceptable Use Policy here. The acceptable use policy, among other things, establishes clear rules for the protection of information by setting out rules for:
-
Use of Devices
-
Installation of Software
-
Use of Email, Internet
-
Passwords and UserID
-
Classification of information
-
Protection of information and documents
-
Telework / home office
-
Reporting of security incidents and vulnerabilities
-
Destruction of information and storage media
-
Return of received devices and information
You can find our Information Security Policy (“InfoSec Policy”) here. The InfoSec Policy includes, among other things, the following topics:
-
Access Control
-
Anti-Malware
-
Asset Management
-
Backup
-
Cryptography
-
Data Classification
-
Document Retention
-
HR Security
-
Mobile Device
-
Password
-
Physical Security
-
Supplier Relationships and Agreements
-
System Acquisition, Development and Maintenance