SlideShare ist ein Scribd-Unternehmen logo
1 von 8
- Internal -
IS/DPP Baseline Training
E-learning – Part 6 – Acceptable Use
2
- Internal - Page
Purpose Driven
Respect the purpose-bound
nature of Information Assets,
applications, devices, access
rights,…
 Professional use. No private
use. No “private interest”
snooping.
 Need-to-know. Do you really
need it to perform your job?
 Specific purpose: e.g. fraud
prevention is not to be re-
used for marketing.
3
- Internal - Page
The Magic Word
4
- Internal - Page
Write “Nicely”
5
- Internal - Page
Internet
 Do not use internet-based applications
for the manipulation or storage of
confidential data, unless you have an
exception approval of the ISO or DPO.
6
- Internal - Page
Internet
 Do not use internet-based applications
for the manipulation or storage of
confidential data, unless you have an
exception approval of the ISO or DPO.
 Do not visit inappropriate
websites on the internet.
 For private use of the internet,
you should use the computers in
the cafeteria.
 Only download and install
applications from the internet
with the approval of IT.
7
- Internal - Page
Social Media
8
- Internal - Page
Key Takeaways
 Respect the purpose-bound nature of
(information) assets.
 Write nicely.
 Don’t use internet-based applications with
confidential data.
 Be careful on social media.
30 sec IS/DPP survival kit
WrapUp

Weitere ähnliche Inhalte

Ähnlich wie IS/DPP for staff #6 - Acceptable use

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Pscf uia hardware show
Pscf uia hardware showPscf uia hardware show
Pscf uia hardware show
Traklight.com
 

Ähnlich wie IS/DPP for staff #6 - Acceptable use (20)

10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
6 professional ethics
6 professional ethics6 professional ethics
6 professional ethics
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
Traklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IPTraklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IP
 
United Inventors Association - Practice Safe Crowdfunding - National Hardware...
United Inventors Association - Practice Safe Crowdfunding - National Hardware...United Inventors Association - Practice Safe Crowdfunding - National Hardware...
United Inventors Association - Practice Safe Crowdfunding - National Hardware...
 
Pscf uia hardware show
Pscf uia hardware showPscf uia hardware show
Pscf uia hardware show
 
Traklight CHICCEO session
Traklight CHICCEO sessionTraklight CHICCEO session
Traklight CHICCEO session
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
How to ensure your iOS apps are NOT rejected
How to ensure your iOS apps are NOT rejectedHow to ensure your iOS apps are NOT rejected
How to ensure your iOS apps are NOT rejected
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Presentation 2
Presentation  2Presentation  2
Presentation 2
 
5 ways to enhance your business using ai venkat k - medium
5 ways to enhance your business using ai   venkat k - medium5 ways to enhance your business using ai   venkat k - medium
5 ways to enhance your business using ai venkat k - medium
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 

Mehr von Tommy Vandepitte

Mehr von Tommy Vandepitte (20)

DPIA template
DPIA templateDPIA template
DPIA template
 
Gegevensbescherming-clausule in (overheids)opdracht
Gegevensbescherming-clausule in (overheids)opdrachtGegevensbescherming-clausule in (overheids)opdracht
Gegevensbescherming-clausule in (overheids)opdracht
 
20190131 - Presentation Q&A on legislation's influence (on travel management)
20190131 - Presentation Q&A on legislation's influence (on travel management)20190131 - Presentation Q&A on legislation's influence (on travel management)
20190131 - Presentation Q&A on legislation's influence (on travel management)
 
GDPR toegepast op huur-verhuur (Dutch)
GDPR toegepast op huur-verhuur (Dutch)GDPR toegepast op huur-verhuur (Dutch)
GDPR toegepast op huur-verhuur (Dutch)
 
Controller-to-processor agreements
Controller-to-processor agreementsController-to-processor agreements
Controller-to-processor agreements
 
Gegevensbescherming makelaars
Gegevensbescherming makelaarsGegevensbescherming makelaars
Gegevensbescherming makelaars
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protection
 
Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
GDPR voor steden en gemeenten (Dutch)
GDPR voor steden en gemeenten (Dutch)GDPR voor steden en gemeenten (Dutch)
GDPR voor steden en gemeenten (Dutch)
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
IS/DPP for staff #8 - Monitoring
IS/DPP for staff #8 - MonitoringIS/DPP for staff #8 - Monitoring
IS/DPP for staff #8 - Monitoring
 
IS/DPP for staff #7 - Incidents
IS/DPP for staff #7 - IncidentsIS/DPP for staff #7 - Incidents
IS/DPP for staff #7 - Incidents
 
IS/DPP for staff #5b - Passwords
IS/DPP for staff #5b - PasswordsIS/DPP for staff #5b - Passwords
IS/DPP for staff #5b - Passwords
 
IS/DPP for staff #5a - Access
IS/DPP for staff #5a - AccessIS/DPP for staff #5a - Access
IS/DPP for staff #5a - Access
 
IS/DPP for staff #3a - Data
IS/DPP for staff #3a - DataIS/DPP for staff #3a - Data
IS/DPP for staff #3a - Data
 
IS/DPP for staff #2 - Why?
IS/DPP for staff #2 - Why?IS/DPP for staff #2 - Why?
IS/DPP for staff #2 - Why?
 
IS/DPP for staff #1 - intro
IS/DPP for staff #1 - introIS/DPP for staff #1 - intro
IS/DPP for staff #1 - intro
 
Training Procurement
Training ProcurementTraining Procurement
Training Procurement
 
Training Information Asset Owners
Training Information Asset OwnersTraining Information Asset Owners
Training Information Asset Owners
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 

IS/DPP for staff #6 - Acceptable use

  • 1. - Internal - IS/DPP Baseline Training E-learning – Part 6 – Acceptable Use
  • 2. 2 - Internal - Page Purpose Driven Respect the purpose-bound nature of Information Assets, applications, devices, access rights,…  Professional use. No private use. No “private interest” snooping.  Need-to-know. Do you really need it to perform your job?  Specific purpose: e.g. fraud prevention is not to be re- used for marketing.
  • 3. 3 - Internal - Page The Magic Word
  • 4. 4 - Internal - Page Write “Nicely”
  • 5. 5 - Internal - Page Internet  Do not use internet-based applications for the manipulation or storage of confidential data, unless you have an exception approval of the ISO or DPO.
  • 6. 6 - Internal - Page Internet  Do not use internet-based applications for the manipulation or storage of confidential data, unless you have an exception approval of the ISO or DPO.  Do not visit inappropriate websites on the internet.  For private use of the internet, you should use the computers in the cafeteria.  Only download and install applications from the internet with the approval of IT.
  • 7. 7 - Internal - Page Social Media
  • 8. 8 - Internal - Page Key Takeaways  Respect the purpose-bound nature of (information) assets.  Write nicely.  Don’t use internet-based applications with confidential data.  Be careful on social media. 30 sec IS/DPP survival kit WrapUp

Hinweis der Redaktion

  1. Welcome to the sixth part of the baseline training IS/DPP. Herein we look at overarching requirement of accaptable use of the data, your access rights, the devices, etc. Some aspects are already covered in the different layers. Herein we focus on a few things that were not addressed yet.
  2. You should always be aware of and respect the purpose bound nature of the data, the applications, devices, access rights,… That applies on three levels: You should use the data, the applications, devices, access rights,… only for professional purposes; only to perform your specific function / role / task; and only for the specific purpose it can be used for.
  3. That also means that you should only give access to people that have a need-to-know and are authorized. If you put data on the intranet, sharepoint, or servers, or pass it on to colleagues or third parties, YOU must ensure that the access rights are properly limited.
  4. If you insert information in the ABC Group systems you should also write “nicely”. That means: that should it be requested or required, we can show it without having to redact it; as much as possible, write objectively and include the source; If you include an opinion, indicate that it is an opinion; do not include medical data or judicial data, unless there is a (general) sign-off of the DPO.
  5. Do not use internet-based applications like dropbox for the manipulation or storage of confidential data, unless you have an exception approval of the ISO or DPO.
  6. Do not visit inappropriate websites on the internet. For private use of the internet, you should use the computers in the cafeteria. Only download and install applications from the internet with the approval of IT.
  7. Be careful on social media. The world is watching. That entails: do not discuss (confidential) ABC Group business on social media, not even with customers; If you refer to ABC Group (marketing) actions, make a hyperlink to the official communication; …
  8. That is it for this section. Here are a few key takeaways.