Field Quick Guide

Use this one‑pager for everyday decisions. For definitions, exceptions, and full RACI, open the full policy sections via the links below.

Essentials
  • Scope: Company-wide (employees, contractors, third-parties).
  • Mandatory compliance: All users must follow applicable policies at all times.
  • Review cadence: Annual review or as needed based on business/risks.
SecurityAccessDataAssetsContinuity

Do & Don’t

Do
Don’t

Security Incidents – What to Do

  1. Report immediately: Escalate via the official channel per Incident Management.
  2. Preserve evidence: Don’t delete emails/files; disconnect compromised device from network if instructed.
  3. Follow guidance: Cooperate with IT investigation; change credentials if requested (y) Password Management Policy).
  4. Document: Note time, systems impacted, symptoms; attach screenshots/logs where possible.

Access Control & Accounts

  • Provisioning/de-provisioning must follow approvals & HR triggers (n) Logical Access Control Policy).
  • Use MFA where available; review privileged access regularly.
  • Shared accounts are prohibited unless explicitly approved and controlled.

Data Protection

Devices, Software & Updates

Vendors & Third Parties

Continuity & Resilience

Passwords & Authentication

  • Comply with Password Management and MFA requirements.
  • Rotate secrets as required; don’t reuse across systems.

Linked Outline (Searchable)