Dear Sir, I need a circular related to office Assets, that no employee allowed to use outside laptop or pen drive in office premises and they are also not allowed to take home any office intellectual property from office.
From India, Indore

You could probably issue a circular titled Cyber security.
Cyber security is very essential in the present times and with increased threats from viruses and DDOS attacks.
The organisation has taken steps to safeguard its IT assets, information and equipment.
Keeping this in view it is hereby adviced that employees are not permitted to use personal pen drives in any system in the office.
Pen drives issued by the office are to be used only by authorised personnel .
Personal laptops are not to be used in office premises.
These steps will enhance cyber security
All concerned may kindly note and ensure compliance with immediate effect.

From India, Pune
Dear MBTI,
Mr Nathrao has raised valid point about the cyber security. Nevertheless, rather than circular, what your company needs is SOP or Policy on Data Security. It can be Policy on Management of IT Assets. In the policy, clearly define what is "office intellectual property".
Dinesh Divekar

From India, Bangalore

Mr Dinesh has given a better perspective than what my bare draft conveys.The idea needs implementation.
From India, Pune
Well, some Cyber Protection tips for my friends here .....
• Avoid unsolicited phone calls, visits, or email messages from individuals asking about you, your employees, your colleagues or any other internal information.
• If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
• Do not share personal or organisational information over telephone, including its structure or networks, unless you are certain of a person’s authority to have such information.
• Do not reveal personal or financial information in email, and do not respond to email solicitations for this information.
• Do not send sensitive information over the Internet before checking a website’s security certificate.
• Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (.com vs .net).
• If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group.
• Install and maintain anti-virus software on individual Laptops/Desktops (Norton Security Standard, McAfee Protection & Encryption, BullGuard, AVG firewalls, and email filters to reduce some of this traffic.
• For Corporate Security use Centralized management console, Remote deployment, patch management and updates, Policy and application control, Website URL and category blocking, Advanced reporting, Change monitoring and file control, Resource leveling and scan throttling, File, folder and disk encryption, Exchange server (Outlook) email scanning, Internet gateway protection, Compatibility with Active Directory, Citrix XenServer or VMware vCenter, Mobile and email incident alerts
• Take advantage of any anti-phishing features offered by your email client and web browser.

From India, Pune
Thank-you so much for your kind inputs. These are very helpful as i am a learner.
From India, Indore

MBTI All of us are learners This forum helps in learning from learned posters
From India, Pune

If you are knowledgeable about any fact, resource or experience related to this topic - please add your views using the reply box below. For articles and copyrighted material please only cite the original source link. Each contribution will make this page a resource useful for everyone.

Please Login To Add Reply

About Us Advertise Contact Us
Privacy Policy Disclaimer Terms Of Service

All rights reserved @ 2021 CiteHR.Com™

All Material Copyright And Trademarks Posted Held By Respective Owners.
Panel Selection For Threads Are Automated - Members Notified Via CiteMailer Server