Cyber security policy

This Cyber Security Policy includes guidelines and provisions for security measures to help mitigate cyber security risk. It applies to all company employees, contractors, volunteers, and anyone who has permanent or temporary access to the company’s systems and hardware.

 

1.     CONFIDENTIAL DATA

 1. CONFIDENTIAL DATA

Confidential data is valuable and is to be kept secret. Company confidential data includes:

·       Unpublished financial information

·       Data of customers/partners/vendors

·       Patents, formulas or new technologies

·       Customer lists (existing and prospective)

 

All employees are obliged to protect this data.

 

2.     PROTECT PERSONAL AND COMPANY DEVICES

 

When employees use their digital devices to access company emails or accounts, they introduce security risk to company data. Employees are to keep both their personal and company-issued computer, tablet and cell phone secure. To keep these devices secure:

·       Keep all devices password protected.

·       Choose and upgrade a complete antivirus software.

·       Do not leave devices exposed or unattended.

·       Install security updates of browsers and systems monthly or as soon as updates are available.

·       Log into company accounts and systems through secure and private networks only.

 

Employees are advised to avoid accessing internal systems and accounts from other people’s devices or lending their own devices to others.

When new hires receive company-issued equipment, they will receive instructions for:

·       Disk encryption setup

·       Password management tool setup

·       Installation of antivirus/anti-malware software

 

Employees are to follow instructions to protect their devices and refer to company Security Specialists/Network Engineers with any questions.

 

3.     SAFEKEEPING EMAILS

 

Emails can host scams and malicious software. To avoid virus infection or data theft, employees must:

·       Avoid opening attachments and clicking on links when the content is not adequately explained (e.g. “Watch this video, it’s amazing.”)

·       Be suspicious of clickbait titles (e.g. offering prizes, advice).

·       Check email and names of people they received a message from to ensure they are legitimate.

·       Look for inconsistencies or giveaways (e.g. grammar mistakes, capital letters, excessive number of exclamation marks).

 

If an employee isn’t sure that an email they received is safe, they can refer to the company Security Specialists.

 

4.     MANAGING PASSWORDS

 

Password leaks are dangerous, since they can compromise the company’s entire infrastructure. Not only should passwords be secure so they will not be easily hacked, but they should also remain secret. For this reason, employees are to:

·       Choose passwords with at least eight characters (including capital and lower-case letters, numbers and symbols) and avoid information that can be easily guessed (e.g. birthdays).

·       Remember passwords instead of writing them down. If employees need to write their passwords, they are obliged to keep the paper or digital document confidential and destroy it when their work is done.

·       Exchange credentials only when necessary. When exchanging them in-person is not possible, employees should prefer the phone instead of email, and only if they personally recognize the person they are talking to.

·       Change their passwords every two months.

 

The company will purchase the services of a password management tool which generates and stores passwords. Employees are obliged to create a secure password for the tool itself, following the abovementioned advice.

 

5.     DATA TRANSFERS

 

Transferring data introduces security risk. Employees must:

·       Avoid transferring sensitive data (e.g. customer information, employee records) to other devices or accounts unless absolutely necessary. When mass transfer of such data is needed, we request employees to ask the company’s Security Specialists for help.

·       Share confidential data over the company network/system and not over public Wi-Fi or private connection.

·       Ensure that the recipients of the data are properly authorized people or organizations and have adequate security policies.

·       Report scams, privacy breaches and hacking attempts.

 

Company Security Specialists/Network Engineers need to know about scams, breaches and malware so they can better protect our infrastructure. For this reason, we advise our employees to report perceived attacks, suspicious emails or phishing attempts as soon as possible to our Security Specialists/Network Engineers, who must investigate promptly, resolve the issue and send a companywide alert when necessary.

Security Specialists are responsible for advising employees on how to detect scam emails. We encourage our employees to reach out to them with any questions or concerns.

 

6.     ADDITIONAL MEASURES

 

To reduce the likelihood of security breaches, we also instruct our employees to:

·       Turn off their screens and lock their devices when leaving their desks.

·       Report stolen or damaged equipment as soon as possible to [HR/IT Department].

·       Change all account passwords at once when a device is stolen.

·       Report a perceived threat or possible security weakness in company systems.

·       Refrain from downloading suspicious, unauthorized or illegal software on their company equipment.

·       Avoid accessing suspicious websites.

 

We also expect our employees to comply with our social media and internet usage policy.

 Company Security Specialists should:

·       Install firewalls, anti malware software and access authentication systems.

·       Arrange for security training for all employees.

·       Inform employees regularly about new scam emails or viruses and ways to combat them.

·       Investigate security breaches thoroughly.

·       Follow these policies provisions as other employees do.

 

Our company will have all physical and digital shields to protect information.

 

7.     REMOTE EMPLOYEES

 

Remote employees must follow the Cyber Security Policy. As remote employees will be accessing the company’s accounts and systems from a distance, they are obliged to follow all data encryption, protection standards and settings, and ensure their private network is secure.

Remote employees are encouraged to seek advice from company Security Specialists/IT Administrators.

 

8.     DISCIPLINARY ACTION

 

All employees are to always follow this policy, and those who cause security breaches may face disciplinary action:

  • First-time, unintentional, small-scale security breach: the company may issue a verbal warning and train the employee on security.
  • Intentional, repeated or large-scale breaches (which cause severe financial or other damage): the company will invoke more severe disciplinary action up to and including termination.

Each incident will be examined on a case-by-case basis.

Additionally, employees who are observed to disregard the company’s security instructions will face progressive discipline, even if their behavior has not resulted in a security breach.

© 2024 Oxford Medwell Academy

CONTACT US

Oxford Medwell Academy

Suite 15

266 Banbury Road

Summertown

Oxford

OX2 7DL

Tel:

01865 238 078