20181119 BS EDITED TechStream Handbook WIP
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• Additional measures<br />
To reduce the likelihood of security breaches, we also instruct our employees to:<br />
Deleted: <br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Turn off their screens and lock their devices when leaving their desks.<br />
Report stolen or damaged equipment as soon as possible to HR and our IT Department.<br />
Change all account passwords at once when a device is stolen.<br />
Report a perceived threat or possible security weakness in company systems.<br />
Refrain from downloading suspicious, unauthorized or illegal software on their company<br />
equipment.<br />
Avoid accessing suspicious websites.<br />
• We also expect our employees to comply with our social media and internet usage policy.<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Our Security Specialists/ Network Administrators should:<br />
Install firewalls, anti-malware software and access authentication systems.<br />
Arrange for security training to all employees.<br />
Inform employees regularly about new scam emails or viruses and ways to combat them.<br />
Investigate security breaches thoroughly.<br />
Follow this policies provisions as other employees do.<br />
Our company will have all physical and digital shields to protect information.<br />
3.3.13 Remote employees<br />
• Remote employees must follow this policy’s instructions too. Since they will be accessing our<br />
company’s accounts and systems from a distance, they are obliged to follow all data encryption,<br />
protection standards and settings, and ensure their private network is secure. We encourage<br />
them to seek advice from our IT Support team.<br />
Deleted: <br />
• We expect all our employees to always follow this policy and those who cause security breaches<br />
may face disciplinary action.<br />
• Everyone, from our customers and partners to our employees and contractors, should feel that<br />
their data is safe. The only way to gain their trust is to proactively protect our systems and<br />
databases. We can all contribute to this by being vigilant and keeping cyber security top of mind.<br />
3.3.14 Personal Use of Systems<br />
• We permit the incidental use of internet, Email and telephone systems to send personal Email,<br />
browse the internet and make personal telephone calls subject to certain conditions set out<br />
below. Personal use is a privilege and not a right. It must be neither abused nor overused and we<br />
reserve the right to withdraw our permission at any time.<br />
• The following conditions must be met for personal usage to continue:<br />
• Use must be minimal and take place substantially out of normal working hours;<br />
• Use must not interfere with business or office commitments;<br />
• Use must not commit us to any marginal costs;<br />
• Staff should be aware that personal use of our systems may be monitored (see below) and, where<br />
breaches are found, action may be taken under the Disciplinary Procedure. We reserve the right<br />
<strong>TechStream</strong> Global Limited, Annexe A, Long Kloof Studios, Darters Road, Gardens, Cape Town, South Africa,<br />
8001 Tel: +27 (0) 21 422 0851 W: www.<strong>TechStream</strong>global.com<br />
Prod 03/2017. Page | 44