Page 75 - Phil Reddin Financial Services Ltd DRAFT V1
P. 75
If your ID Card is lost or stolen report it immediately to Information Security.
It is important that all staff assist this endeavour by displaying your badge clearly at all times.
7.11.2 Visitor Controls
Visitors are defined as people who are neither an EBS employee nor a member of another EBS
Company co-located at EBS premises. Agents, temporary personnel and contractors who have not
been issued with a personal EBS Id card must be treated as if they are visitors with regard to being
granted access to EBS premises.
Personnel hosting the visitor(s) must:
• Collect / return your visitor(s) from / to the Security / reception desk.
• Escort the visitor(s) at all times whilst on EBS premises.
• In the case of a building evacuation, look after the personal safety of your visitor(s) and
account for the visitor(s) to your Fire Warden (listed in each department).
Under no circumstances is anybody from outside of EBS allowed connect their PC\Laptop to the EBS
network. Any third parties requiring access will be provided with necessary EBS configured IT systems
as approved by Information Security.
If you have any visitors that wish to transfer data / information to the EBS network you must schedule
a review of the transfer device with Information Security preferably prior to the arrival of the visitor.
Only after this review may Information Security give authorisation for the device be used in EBS.
A breach of this control will be deemed misconduct and could result in disciplinary action up to and
including dismissal for cases of gross misconduct.
7.11.3 Use of EBS Facilities
Facilities such as PCs and email are to be used for EBS related business purposes. While reasonable
personal use is permitted, you must bear in mind that such use is monitored and privacy is NOT
guaranteed. Assets in this category include, but are not restricted to, the following:
• Email systems — both internal and external (Internet) email.
• Computer systems (hardware and software).
• Photocopiers.
• Fax.
• Phones.
• Personal Digital Assistants (PDAs).
Effective communication requires that facilities remain available for legitimate business use.
Unauthorised personal uses of these facilities will not only incur unnecessary costs, could also lead to
denial of business access to such services, may be deemed misconduct and could result in disciplinary
action up to and including dismissal for cases of gross misconduct.
7.11.4 Clean Desk Guideline
Before leaving your place of work for the day you should ensure that your work area (i.e. work
surfaces) is cleared of all papers, files and media, and that all Confidential and Restricted information
is secured.
You should;
Page 74 of 83