You are on page 1of 1

Form Num.

F-07-06
GREATECH IT Policy Form Rev. 0
Eff. Date 1-Jul-17

Greatech Integration (M) Sdn Bhd


Greatech’s IT department provide a reasonable level of freedom and privacy, users should be
aware that all equipment, network infrastructure, and software applications are the property
of the company and therefore are to be used for official use only. Also, all data residing on
equipment is also the property of the company and therefore, should be treated as such, and
protected from unauthorized access.

1. All passwords used to access systems must be kept secure and protected from unauthorized use.
2. Password should be at least 8 alphanumeric characters.
3. Passwords are an important aspect of computer security. They are the front line of protection for user accounts.
A poorly chosen password may result in the compromise of entire network. Therefore, users are required to
change their password at every 6 months.
4. No user account can be shared between individuals. Authorized users are responsible for the security of their
own passwords and accounts.
5. Do not transfer personally identifiable information on portable equipment and storage devices.
6. All computers on the network, whether owned by the employee or company, shall be continually executing
approved virus scanning software with a current, up to date virus definition files.
7. Employees must use extreme caution when opening e‐mail attachments received from unknown senders.
8. All computers should be kept secure. Users should lock their computer when not attended, to protect
unauthorized users from accessing secure files.
9. Violations of the rights of any person or company protected by copyright, trade secret, patent or other
intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution
of “pirated” or other software products that are not appropriately licensed for use by the company.
10. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of
photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of
any copyrighted software for which the end user does not have an active license is strictly prohibited.

User Signature

User Name Mohd Faizal bin Mohd Radzy Date 07.10.2021

You might also like