1. Home
  2. Docs
  3. IT Handbook
  4. IT Security Policy

IT Security Policy

Information Technology Security Policy

This policy provides guidelines for the protection and use of information technology assets, platforms and resources within the organisation to ensure integrity, confidentiality and availability of data and assets.

We try to lay out guidelines without being overly restrictive toward members; most people expect to have a certain freedom in these matters, and this is fair as long as they follow security and data protection guidelines below in this policy.

Virus or other security breach

In the event your hardware (Laptop, Desktop, Mobile phone, or other Smart device) is compromised by malicious software such as a virus, malware, ransomware, is lost, stolen, or used by someone suspicious without your knowledge etc. such breaches are to be reported to the Jeder Institute’s IT Dept immediately.

The Jeder Institute’s IT Dept will need to be made aware of any security breach so they can check over your hardware and ensure that it is safe to operate within the Jeder Institute’s IT systems.

 

Technology Access

Upon membership you will be emailed usernames and passwords to the various IT systems. Every member will be issued with a unique password to access the Jeder Institute’s technology. All passwords set must meet the following requirements:

  • At least one uppercase character
  • At least one Lowercase character
  • At least one numbers 0-9
  • At least one non-alphanumeric character: e.g., @#$_%

 

Your username and password together, for any of Jeder Institute’s IT Systems must never be shared with any other member within the organisation.

The Jeder Institute’s System Administrator is responsible for the issuing of the initial password for all members.

Where an employee forgets the password or is ‘locked out’, then the Jeder Institute’s Systems Administrator is authorised to reissue a new password that will meet the above listed password requirements.