Acceptable Use and Information Security Policy
You can find our Acceptable Use Policy here. The acceptable use policy, among other things, establishes clear rules for the protection of information by setting out rules for:
Use of Devices
Installation of Software
Use of Email, Internet
Passwords and UserID
Classification of information
Protection of information and documents
Telework / home office
Reporting of security incidents and vulnerabilities
Destruction of information and storage media
Return of received devices and information
You can find our Information Security Policy (“InfoSec Policy”) here. The InfoSec Policy includes, among other things, the following topics:
Access Control
Anti-Malware
Asset Management
Backup
Cryptography
Data Classification
Document Retention
HR Security
Mobile Device
Password
Physical Security
Supplier Relationships and Agreements
System Acquisition, Development and Maintenance