Page 75 - Phil Reddin Financial Services Ltd DRAFT V1
P. 75

If your ID Card is lost or stolen report it immediately to Information Security.

               It is important that all staff assist this endeavour by displaying your badge clearly at all times.

               7.11.2 Visitor Controls
               Visitors  are  defined  as  people  who  are  neither  an  EBS  employee  nor  a  member  of  another  EBS
               Company co-located at EBS premises. Agents, temporary personnel and contractors who have not
               been issued with a personal EBS Id card must be treated as if they are visitors with regard to being
               granted access to EBS premises.

               Personnel hosting the visitor(s) must:

                    •  Collect / return your visitor(s) from / to the Security / reception desk.
                    •  Escort the visitor(s) at all times whilst on EBS premises.
                    •  In the case of a building evacuation, look after the  personal safety of your visitor(s) and
                       account for the visitor(s) to your Fire Warden (listed in each department).
               Under no circumstances is anybody from outside of EBS allowed connect their PC\Laptop to the EBS
               network. Any third parties requiring access will be provided with necessary EBS configured IT systems
               as approved by Information Security.

               If you have any visitors that wish to transfer data / information to the EBS network you must schedule
               a review of the transfer device with Information Security preferably prior to the arrival of the visitor.
               Only after this review may Information Security give authorisation for the device be used in EBS.

               A breach of this control will be deemed misconduct and could result in disciplinary action up to and
               including dismissal for cases of gross misconduct.

               7.11.3 Use of EBS Facilities
               Facilities such as PCs and email are to be used for EBS related business purposes. While reasonable
               personal use is permitted, you must bear in mind that such use is monitored and privacy is NOT
               guaranteed. Assets in this category include, but are not restricted to, the following:

               •  Email systems — both internal and external (Internet) email.
               •  Computer systems (hardware and software).
               •  Photocopiers.
               •  Fax.
               •  Phones.
               •  Personal Digital Assistants (PDAs).
               Effective  communication  requires  that  facilities  remain  available  for  legitimate  business  use.
               Unauthorised personal uses of these facilities will not only incur unnecessary costs, could also lead to
               denial of business access to such services, may be deemed misconduct and could result in disciplinary
               action up to and including dismissal for cases of gross misconduct.

               7.11.4 Clean Desk Guideline
               Before  leaving  your  place  of  work  for  the  day  you  should  ensure  that  your  work  area  (i.e.  work
               surfaces) is cleared of all papers, files and media, and that all Confidential and Restricted information
               is secured.

               You should;







                                                                                             Page 74 of 83
   70   71   72   73   74   75   76   77   78   79   80