Code of conduct
Summary
The code of conduct describes a set of information security principles, applicable to all employees, internal and external.
Principles
Remote working
- You are not allowed to leave the laptop unattended in car or hotel unless properly secured, e.g. using a cable lock
- Be aware of people peeking over your shoulder. If this cannot be avoided, use a privacy screen
- Avoid the use of public Wi-Fi networks. If you must, use a VPN client
Protection
For mobile devices that are used to store or process information classified as Confidential or Sensitive:
- Full disk encryption (BitLocker, FileVault or Veracrypt) must be enabled
- The device must be protected using a password, pin code and/or bio metrics
- Only authorized repair shops may be used
- Unlock codes or passwords may not be shared
- Remote device wipe is enabled
Usage of own devices
It is allowed to use own mobile devices ("BYOD") for work-related tasks (e.g. accessing email) only if they submit to the terms in this policy.
Reporting incidents
You have the responsibility to report a (suspected) information security incident as soon as possible to the Incident manager, following the Incident management process.
Examples of information security incidents include:
- Loss of a (mobile) device or data carrier;
- Malfunctioning security measure (such as a lock or alarm);
- Malfunctioning hardware or software;
- Data leak or breach of confidentiality;
- Breach of Policies or guidelines;
- Access violations
Clean desk and clear screen policy
- Do not leave Confidential or Sensitive information unsupervised;
- Always lock your session (or log off) when you leave your desk;
- When printing Confidential or Sensitive information, immediately pick them up from the printer.
The use of Internet and social media
- You are free to use Internet for private matters during work time, within reasonable limits and as long as it does not violate any laws or company policies;
- You are allowed to use social media, as long as you realize you are speaking on behalf of our organization;
- You are not allowed to use file sharing tools to share confidential or sensitive information.
The use of software and tools
- The use/abuse of tools that are able to override security controls is prohibited;
- For all software (components) and media files (image, audio and video clips) you download, you must check the copyright/license agreement to make sure:
- Are you allowed to use it?
- Are you allowed to redistribute it?
- Always use trustworthy sources for downloads;
- When in doubt, contact the Security officer.
Updated over 1 year ago
What’s Next