Sensitive information left out on a desk can easily be taken by thieving hands and seen by prying eyes. All sensitive and confidential information should be securely stored – especially things like system passwords. The bottom line is simple. You need to know and follow the organization’s secure/sensitive information policies and procedures – especially when it comes to passwords. Cybersecurity policies are not to be taken lightly.
|Main Topic:||Ethics & Integrity|
|Other Topics:||Compliance, Cybersecurity|
|Competencies:||Demonstrating Integrity & Professionalism, Ensuring Professional and Compliant Behavior|
|Suggested Industry Usage:||Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government|
|Available in Other Languages:||Spanish (NA) Portuguese (Brazilian) Italian German French Chinese (Simplified)|
|Available in Other Assets:||A.C.T. with Integrity™: Real Situations for Discussion (Off-The-Shelf Video Program (ILT)) ID:2600|