3.3 Procedures for security of data Copy

Security procedures include:

Entry controls

Any stranger seen in entry-controlled areas should be reported.

Secure lockable desks and cupboards

Desks and cupboards should be kept locked if they hold confidential information of any kind. (Personal Data is always considered confidential.)

Methods of disposal

Paper documents should be shredded.

Digital storage devices should be physically destroyed when they are no longer required

Equipment

All computer users must ensure that individual monitors do not show confidential information to passers-by and that they log off from their PC when it is left unattended.

Click the green “Mark Complete” button below to progress to the next lesson, personal growth.

Enter your email below to access our FREE taster courses


By submitting your email address, you confirm you would like to access the free WELL Training taster courses.

We will not pass on your email address to anyone else. Further details are available on our Privacy Policy - please click here to view the policy.