Documentation

{{docApp.title}}

{{docApp.description}}

How can we help?

{{docApp.searchError}}
{{product.name}}

Searching in {{docApp.searchFilterBySpecificBookTitle}}

{{docApp.searchResultFilteredItems.length}} results for: {{docApp.currentResultsSearchText}} in {{docApp.searchFilterBySpecificBookTitle}}
Search results have been limited. There are a total of {{docApp.searchResponse.totalResultsAvailable}} matches.

You have an odd number of " characters in your search terms - each one needs closing with a matching " character!

{{docApp.libraryHomeViewProduct.title || docApp.libraryHomeViewProduct.id}}

{{docApp.libraryHomeViewProduct.description}}

  1. {{book.title}}

{{group.title || group.id}}

{{group.description}}

  1. {{book.title}}

{{group.title}}

Mobile Security

Mobile Device Protection

Hornbill Technologies requires mobile devices (laptops, mobile computers, PDAs, Mobile phones, Blackberrys, USB sticks, and other similar memory devices) to have password protection where appropriate/possible and to be encrypted.

Hornbill Technologies requires that notebook computers are physically protected against theft and damage while in transit, in storage, or in use and that, in cases of loss or theft, this is reported immediately.

Application Security

Hornbill Technologies requires that all the most recent operating system and application security-related patches, fixes, and updates have been installed.

Hornbill Technologies requires that notebook computers are backed up in line with the organization’s backup procedure.

Public Access Points

Hornbill Technologies requires users to comply with the organization’s requirements on the means of connecting to public access points and accessing the organization’s information. Hornbill Technologies requires users to act with care in public places so as to avoid the risk of screens and confidential notebook computer activity being overlooked by unauthorized persons.

Hornbill Technologies provides users with appropriate training and awareness to ensure that they understand the risks of wireless computing and that they understand and can carry out their agreed security obligations.

Working from Home

All remote workers and teleworkers working from home must use a security enabled wireless configuration where that is the preferred connection method and a secure connection (VPN) to the organization’s network. Remote workers must not transfer files from their own personal computers to Hornbill’s network and vice versa.

In This Document