Professional Documents
Culture Documents
TECHNOLOGY SECURITY
1. If you are leaving your desk unattended for any amount of time, you must lock your PC/Screen.
3. Email attachments or Internal/Restricted information must not be sent outside of the corporate network
you are working in. This includes the sending of such emails to personal and FDM group email accounts.
4. FDM or corporate email addresses must not be used as verification accounts for external sites, unless
work-related and with IT approval.
6. External hardware (including USB sticks, modems, CD ROM etc.) and Bring Your Own Devices (BYOD)must
not be connected to an FDM or client network or power supply unless authorised to do so.
8. Employees must not have remote access to FDM or client equipment unless authorised to do so.
9. Shareware and open software should not be used or installed unless approved by IT.
10. Development or Project staff must not have access to the production environment.
11. The production environment must be protected and no staff should have standing/permanent access.
12. Production data must not be used in development or testing unless masked or anonymised.
13. Privileged Access must be controlled and logged. When possible, work on the “least privilege” principle.
14. Where access is permitted, all social media must be used in accordance with the policies and procedures of
FDM and our respective clients.
16. Without exception, only third party cloud hosting platforms which are provided through FDM IT may be
used for FDM business.
Name:.................................................................................... Signature:.....................................................................................
Date: ......................................................................................
*We reserve the right to amend our policies from time to time.
fdmgroup.com