All users are responsible for preventing the theft of IT assets. Users shall ensure following controls in order to prevent theft of, or unauthorized a...
Users are responsible for ensuring that information exchanged via e-mail is protected to a level commensurate with the classification of the informati...
Information assets must have their document classification clearly marked on the cover page, footer, header or watermark regardless of format. Includi...
Any breach of information security, or misuse of IT Resources is regarded as serious. Breaches may result in disciplinary action, up to and including ...