27.11.2018 Views

20181119 BS EDITED TechStream Handbook WIP

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Additional measures<br />

To reduce the likelihood of security breaches, we also instruct our employees to:<br />

Deleted: <br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Turn off their screens and lock their devices when leaving their desks.<br />

Report stolen or damaged equipment as soon as possible to HR and our IT Department.<br />

Change all account passwords at once when a device is stolen.<br />

Report a perceived threat or possible security weakness in company systems.<br />

Refrain from downloading suspicious, unauthorized or illegal software on their company<br />

equipment.<br />

Avoid accessing suspicious websites.<br />

• We also expect our employees to comply with our social media and internet usage policy.<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Our Security Specialists/ Network Administrators should:<br />

Install firewalls, anti-malware software and access authentication systems.<br />

Arrange for security training to all employees.<br />

Inform employees regularly about new scam emails or viruses and ways to combat them.<br />

Investigate security breaches thoroughly.<br />

Follow this policies provisions as other employees do.<br />

Our company will have all physical and digital shields to protect information.<br />

3.3.13 Remote employees<br />

• Remote employees must follow this policy’s instructions too. Since they will be accessing our<br />

company’s accounts and systems from a distance, they are obliged to follow all data encryption,<br />

protection standards and settings, and ensure their private network is secure. We encourage<br />

them to seek advice from our IT Support team.<br />

Deleted: <br />

• We expect all our employees to always follow this policy and those who cause security breaches<br />

may face disciplinary action.<br />

• Everyone, from our customers and partners to our employees and contractors, should feel that<br />

their data is safe. The only way to gain their trust is to proactively protect our systems and<br />

databases. We can all contribute to this by being vigilant and keeping cyber security top of mind.<br />

3.3.14 Personal Use of Systems<br />

• We permit the incidental use of internet, Email and telephone systems to send personal Email,<br />

browse the internet and make personal telephone calls subject to certain conditions set out<br />

below. Personal use is a privilege and not a right. It must be neither abused nor overused and we<br />

reserve the right to withdraw our permission at any time.<br />

• The following conditions must be met for personal usage to continue:<br />

• Use must be minimal and take place substantially out of normal working hours;<br />

• Use must not interfere with business or office commitments;<br />

• Use must not commit us to any marginal costs;<br />

• Staff should be aware that personal use of our systems may be monitored (see below) and, where<br />

breaches are found, action may be taken under the Disciplinary Procedure. We reserve the right<br />

<strong>TechStream</strong> Global Limited, Annexe A, Long Kloof Studios, Darters Road, Gardens, Cape Town, South Africa,<br />

8001 Tel: +27 (0) 21 422 0851 W: www.<strong>TechStream</strong>global.com<br />

Prod 03/2017. Page | 44

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!