You are on page 1of 18

CYBERSECU

RITY
POLICY
According to the 8 Factors of Cyber Security
for Tagoloan Community College
Computer Laboratory and
Public Wi-Fi Rules
Factor 1: Acceptable Use
DO’s DON’Ts
 Use computer labs and public × Avoid non-academic activities in
Wi-Fi exclusively for academic labs or on public Wi-Fi.
tasks. × Download unauthorized files in
 Respect time limits to be either setting.
considerate of others. × Mess with computer settings or
 Log out and delete personal data hardware.
after each use. × Keep login credentials private
 Report technical issues right and don't share access.
away. × Violate copyright laws by
 Follow instructions given by lab downloading or sharing
staff. copyrighted material without
 When using public Wi-Fi, ensure permission.
academic use in line with lab
guidelines.
Student Information System
(SIS) Account Policy
Factor 2: Password Management
DO’s DON’Ts
 Create a strong or long password × Share your password with anyone.
that consists of 12 characters, also × Create passwords that are easy to
requires to have upper and lower guess such as name or birthdates.
case letters, special characters, and × Leave your accounts logged on
numbers. different devices that are not yours,
 Update your passwords regularly make sure that it is logged off so
every 9 months. (this is required that no one will plot to use your
especially for your social security account for any suspicious or
numbers or any bank accounts). illegal activity.
 Create different passwords for your × Recycle your passwords from
different online accounts, to different online accounts or
prevent vulnerability from cyber- applications.
attacks.
 Make sure to keep your passwords
memorable enough to remember
whenever you log in to any of your
accounts.
Faculty and Student Data
Protection Policy
Factor 3: Data Security
DO’s DON’Ts
× Don’t disclose any confidential or
 To help prevent opportunistic
sensitive student information to
theft, lock the devices. others.
 When not in use, secure sensitive
× Don’t let unauthorized people
information about platforms in
education. into staff areas don’t plug any
 Make regular backups of
device into the computer as this
important data.
may cause security problems if
the computer is infected with
malware.
× Don’t click on links from an
unknown or untrusted source.
Online Safety and
Cyberbullying Prevention
Policy
Factor 4: Cyberbullying and Online Safety
DO’s DON’Ts
 Be respectful to everyone you × Bully anyone online including
encounter online. students or teachers.
 Make sure you are being × Send, post, sharing harmful
cautious with what you post information about anybody
online. online.
 Report any negative behaviors of × Reply, the only action you can
cyber bullies, once they violate take towards cyber bullies is to
different aspects of different report them to cyber security
people online. personnel or any law
enforcement for further
investigation.
× Become a cyber bully.
Social Media Usage
Guidelines
Factor 5: Social Media
DO’s DON’Ts
 Engage in positive and respectful × Over share confidential or
conversations with others. personal Information, such as
 Maintain Professionalism. your address or phone number.
 Provide Educational Content.
× Post inappropriate or offensive
 Credit and give proper
content that could harm others
attribution when sharing content
or yourself.
from others. × Spread false information or
 Respect privacy and express offensive views.
confidentiality. × Cross Boundaries.
× Remember to give credit to the
writer or author when posting or
sharing their words of wisdom or
quotes.
Copyright and Fair Use
Guidelines
Factor 6: Copyright and Fair Use
DO’s DON’Ts
 Understand the basics of
× Assume everything on the
copyright law.
 Seek permission when internet is free to use.
necessary. × Copy or distribute copyrighted
 Properly attribute and cite material without permission.
sources. × Rely solely on disclaimers or
 Familiarize yourself with fair use waivers.
guidelines. × Use excessive amounts of
 Use Creative Commons and copyrighted material.
open-source materials.
Security Awareness Guidelines
Factor 7: Security Awareness Training
DO’s DON’Ts
 Enhancing security awareness × Share your passwords keep them
through education. to yourself.
 Protect your accounts with × Avoid suspicious links.
strong passwords. × Leave your devices unattended.
 Be aware of phishing attempts. × Pay attention to security alerts.
 Secure your personal data and × Respect digital boundaries.
make backups of important files.
 Ensure Your Gadgets are Secure
Alert and Aware
Factor 8: Reporting Suspicious Activity
DO’s DON’Ts
 Observe carefully and stay alert × Ignore potential threats.
for unusual behavior. × Hesitate to report even minor
 Report anything that seems anomalies or concerns.
suspicious. × Speculate.
 Notify authorities or relevant × Report suspicious activity as
personnel immediately soon as possible.
 Provide clear and accurate × Take action alone and leave
information about the incident. investigation to trained
professionals.
THANK YOU FOR
LISTENING

You might also like