IT Policy Overview

Hi team, Today, I want to highlight some key IT policies that help us use company systems, data, and technology responsibly and securely.
These guidelines aren’t here to restrict us—they’re here to protect all of us. Let’s break it down:
Number 1: Device & Network Use
Use company devices and networks strictly for authorized work purposes only.
Number 2: Email Safety
Be extra cautious with email attachments and links to avoid phishing attacks.
Number 3: Account Security
Never share your login credentials, and always lock your screen when stepping away from your desk.
Number 4: Software Rules
Do not install unapproved software or applications on company devices.
Number 5: Data Storage
Storing confidential company data on personal devices or cloud accounts is strictly prohibited.
Number 6: Incident Reporting
If you notice anything suspicious, report it to IT immediately.
By following these policies, we help keep our systems secure, protect sensitive information, and ensure smooth day-to-day operations.
Thanks for staying informed and vigilant—your actions make a difference.