Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Stand-up Meetings for BT Project Employees Information.

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

Protect Our Students Protect Ourselves
Site Security Presentation
Emergency Preparedness and Response
Privacy and Information Security Training ( ) VUMC Privacy Website
System Security & Patient Confidentiality General Lesson 1.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Springfield Technical Community College Security Awareness Training.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
FERPA: Family Educational Rights and Privacy Act.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Unemployment World’s Fiercest Enemy. Unemployment.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
10 Essential Security Measures PA Turnpike Commission.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Practical Information Management
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
HIPAA PRIVACY AND SECURITY AWARENESS.
Graduation Meeting Thursday, March 1st, 2012 What You Need to Know.
Have you learnt the material? Checking test Made by Natalie Bogomaz LB Start.
©Holm Publications Security Awareness Presentation.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Information Security Awareness Induction Program
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Bruce Lee By: Debby Kwan Bruce Lee was born on the 27th November 1940 in San Francisco Chinatown in the United States.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Data Protection Act ‘ What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Physics Jeopardy!. $100 $200 $300 $400 $500 Newton’s Laws EnergyMomentum Circular Motion GravitationThermo.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
My Favorite Novel: WARRIORS
Information Systems Unit 3.
Einsteinium By: Carrington Austin 99 Es 252. Properties and Uses There are no properties, Einsteinium is too small There are no properties, Einsteinium.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 2-7 Diffusion 2 Molecules Molecules are the smallest part of a substance that still have the characteristics of that substance. Molecules are the smallest.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Security Sample security policy Dr Alexei Vernitski.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
End BBBB HHHH EEEE CCCC AAAA JJJJ FFFF GGGG DDDD IIII LLLL RRRR OOOO MMMM KKKK TTTT PPPP QQQQ NNNN SSSS.
ISMS Information Security Management System
Administrative Practices Outcome 1
HIPAA Basic Training for Privacy and Information Security
Servicenow Training Institute in Hyderabad. About Us ServiceNow Administration, ServiceNow Develo pment, ServiceNow Integration Training provide at KMRsoft.
C-TPAT Awareness Training Program
Security of People, Property and Information
Provide reception services
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
HIPAA Overview.
Premier Employee Program Version 4.0
FOOD DEFENSE TRAINING Brigiotta’s Farmland Produce & Garden Center, Inc.
SECURITY TRAINING AND THREAT AWARENESS
Handling Information Securely
Presentation transcript:

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Stand-up Meetings for BT Project Employees Information Security is everyone's responsibility ! ISG

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR  Policies Policies to Adhere  ISG ISG on the Intranet Agenda

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Policies to Adhere

Do’s & Don’ts  Wear ID badges around your neck in TechM Premises.  Challenge any person whom you find without TechM ID badge and report to security guard.  Affix appropriate parking stickers on your vehicles.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Do Not enter the restricted areas without proper authorization. Do not put obstacles in the way of access doors.  Do not Tail-Gate. Swipe to access.  Escorting visitors with due approval for entry within the company premises.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Photography in Company's premises is strictly prohibited.  Co-operate with security guards when they request you for checking your belongings… declare at the entry to the Security Guard and get proper approval…

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Do Not leave PC unattended without locking the screen.  Do not Share Passwords with anyone, even not with Manager.  When choosing a password, ensure that is not easy to guess and change it regularly, especially if you think it has become known to somebody else.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Ensure that laptop is allocated on your name. If it is on project sharing basis, ensure that Laptop Authorization form is duly filled & approved and present with them at all times.  Use your active cards/secure Ids safely. Do not share them with anyone.  Backup your data regularly.  Ensure restoration drills.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR TechMahindra requires you to: Are all documents labeled as per classification guidelines? –"Company Confidential", –"Restricted" –"Client Confidential", –"PUBLIC", or –"Commercial in Confidence" Are "RESTRICTED" and "CLIENT CONFIDENTIAL" documents kept in the custody of the PM and secured in locked

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Collect printouts immediately, Do not to take classified documents outside security enclosures.  For the disposal of any document use shredder. Do not leave any confidential papers on the desk unattended.  Lock and key all your important and confidential documents.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Do not visit Internet sites that contain obscene, hateful or any objectionable material.  Do not make or post indecent remarks, proposals, or materials on the Internet.  Avoid storing or downloading Games, Songs, Personal photographs or any other personal information, etc. on your desktop/ laptop.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Do not download files from the internet or attachments until you are aware of the sender.  Do Not initiate / forward chain or spam mails.  Do not share Folder/files. Sharing can be done to intended users only for official purpose and must be removed when not required. Under no circumstances, permission should be set for “Everyone” for open accessibility...

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Do’s & Don’ts  Anything suspicious around you, should be immediately reported Incident Management System or to the Security/ immediate Manager (in after working hours/ late working hours) or at  Participate religiously in the Fire Drills/ Evacuation Drills Conducted for your facility. This enables strengthening and improving our emergency preparedness.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR BT requires you: to keep all BT information (whether or not it is marked “NOT TO BE SHOWN OUTSIDE BT”, "INTERNAL", “IN CONFIDENCE”, or “IN STRICTEST CONFIDENCE”) confidential and not to disclose it, unless you first have BT’s written permission; if you have access to BT customer or personal information, to comply with the provisions of the Data Protection Act 1998; to access BT computer systems and BT electronic information only if you have been authorised to do so. Unauthorised access may result in your being prosecuted under the Computer Misuse Act 1990; to access and use BT computer systems and BT information only as is necessary to do your job properly; to read and understand BT Security Requirement and Security Policy; to comply with other BT instructions and security policies that may be notified from time to time; and not to connect any equipment not supplied by BT to any BT LAN port. If you are in any doubt as to these requirements or the policies of BT Group Security, further advice and information can be obtained from your BT contact.

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Information Security is everyone's responsibility! Failing to comply with ISG/ BT Security Policy may lead you to Disciplinary Actions to an extent of Immediate Termination of your employment with TechM Do’s & Don’ts

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Information Security Policies at TechM Contd.. Do Visit the URL – hhhh tttt tttt pppp :::: //// //// mmmm yyyy bbbb eeee aaaa tttt.... tttt eeee cccc hhhh mmmm aaaa hhhh iiii nnnn dddd rrrr aaaa.... cccc oooo mmmm UUUUseful Links BBBBMS SSSSupport Functions IIIInformation Security Group hhhh tttt tttt pppp :::: //// //// iiii ssss gggg.... tttt eeee cccc hhhh mmmm aaaa hhhh iiii nnnn dddd rrrr aaaa.... cccc oooo mmmm isg tttt eeee cccc hhhh mmmm aaaa hhhh iiii nnnn dddd rrrr aaaa.... cccc oooo mmmm

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR ISG on the Intranet

ISG Portal - isg.techmahindra.com

Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR ISG IMS – isg.techmahindra.com/ims

ISG IMS – isg.techmahindra.com/ims Report an Incident - Screen

ISG related Trainings…

Any Questions???

Thank You! Information Security is everyone's responsibility! Mail your queries / suggestions to