Dos and Don’ts.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
PGCPS Security Awareness Summary L2-ME Heading: SummaryPage GUID: L2-LO-89880Page Number: Gfx GUID: L2-ME Body Text:
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Property Management Overview
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
IT Retreat 2009 IT Security Controls and Initiatives.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Payment Card Industry (PCI) Data Security Standard
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
10 Essential Security Measures PA Turnpike Commission.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security Awareness Norfolk State University Policies.
Securing Information in the Higher Education Office.
Program Objective Security Basics
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
ESCCO Data Security Training David Dixon September 2014.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Information Systems Security Operational Control for Information Security.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
© Copyright 2010 Hemenway & Barnes LLP H&B
Chapter 2 Securing Network Server and User Workstations.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Technology Acceptable Use An Overview
East Carolina University
The CPU is the brain of the computer
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
GSBS IT Resources and Security
Digital $$ Quiz Test your knowledge.
Security Measures Module 7 Section 1.
Internet safety By DAGAS YACMAS team.
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
Lesson 2: Epic Security Considerations
How it affects policies and procedures
Security in mobile technologies
Introduction to the PACS Security
Information Technology Montana State University
Information Security in Your Office
Presentation transcript:

Dos and Don’ts

Overview Computers are indispensable learning tools nowadays, and it is main importance to understand how to secure the computers, the data, and other electronic devices. We have are some tips to help us in the awareness against information leakage and IT security.

Dos Be accountable for your IT assets and data, Adhere to Policy on Use of IT Services and Facilities Use good judgement to protect your data, Ensure sensitive information on the computer screen is not visible to others Protect your user ID and password Use strong password, and change your password on a regular basis, Lock the desktop before leaving desk, Maintain the Clear Desk Policy, Report all suspicions activity Respective Managers / IS Team, Display the ID card all the time,

Don’ts Don’t take portable device (such as Pen drive, Memory card, Portable HDD) into ODC area, Don’t take any Photo it covers the Sensitive Information, such as White board, Monitor screen, Documents, Don’t transfer data from Huawei-domain-facilities to Non-Huawei-domain-facilities by personal, Don’t leave your computer / sensitive documents unlocked, Don’t share your passwords with others, Don’t discuss something sensitive in public place, Don't download data from doubtful sources, Don't use unauthorized software and programs, Don’t build Wi-Fi network by personally at ODC, Don’t repair facilities by personal,