7. Must process only data that pertains to official business and is authorized to be processed on the system.
8. Must report all security incidents or suspected incidents to the Risk/Compliance Officer or IT Section.
9. Must discontinue use of any system resources that show signs of being infected by a virus or other malware and report the suspected incident.
10. Must challenge unauthorized personnel that appear in your work area.
11. Must use only the data for which you have been granted authorization.
12. Must notify his/her line manager if access to system resources is beyond that which is required to perform your job.
13. Must attend computer security awareness and privacy training as requested by company.
14. Must coordinate access requirements, and access parameters, with the line manager.
15. Must ensure that access to application-specific sensitive data is based on your job function.
16. Must safeguard resources against waste, loss, abuse, unauthorized users, and misappropriation.
17. Must ensure that access is assigned based on your line manager’s approval.
18. Must familiarize yourself with any special requirements for accessing, protecting, and utilizing data, copyright requirements, and procurement of sensitive data.
19. Must ensure electronic official records (including attachments) are printed and stored according to company policy and standards.
20. Must ensure that classified and proprietary information sent to printer is handled in a secure manner.