ISM CD Policy Clear Desk Issue 1 2022

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

SafeIT

ISMS PROCEDURE

Procedure No: ISM - Email Version: 1


Date: 19/10/22 Authorized :Paul Miser

Title: ISMS POLICY on Clear Desk

1. Purpose
The purpose of this document is to state the SafeIT policy on Clear Desk and its
application.
2. Responsibilities
The ISM shall remain responsible for maintenance, review and modification of this
policy and its related controls.
3. Policy
SafeIT work processes requires it to protect its information from voluntary or
involuntary disclosure. SafeIT workstations and offices are visited by various
personnel like clients, vendor, maintenance, other project personnel, etc.
Lock sensitive documents and physical media in secure places or cabinets. physically
secure movable equipment (laptop, harddisk,..) with appropriate locking mechanism
like security cables. Secure your workstation before walking away and/or close of
work.
Do not post sensitive documents on the desktop. Do not leave documents that contain
sensitive information like, User IDs and passwords, IP addresses, contract info,
account numbers, client list, IPRs, Employee records or any such things which are
sensitive information in nature.
Please keep your workspace neat. If it is messy, you may not notice when something
is missing.
End of the day, tidy up your physical and computer desktop for sensitive material,
lock up drawers, cabinets and office locations and secure expensive equipment like
laptops, hard drives, PDAs, etc.

5. Records
Violation audit records

IQMSL-IS3-ISMS-LA–IRCA-2348 Page 1 of 1
CASESTUDY 2022

2022 THIS MATERIAL IS THE PROPERTY OF IQMSL.


UNAUTHORISED COPYING OR USE IS PROHIBITED.

You might also like