How can we help?
Searching in {{docApp.searchFilterBySpecificBookTitle}}
{{docApp.searchResultFilteredItems.length}} results for: {{docApp.currentResultsSearchText}}
in {{docApp.searchFilterBySpecificBookTitle}}
Search results have been limited. There are a total of {{docApp.searchResponse.totalResultsAvailable}} matches.
You have an odd number of " characters in your search terms - each one needs closing with a matching " character!
-
{{resultItem.title}}
{{resultItem.url}}
{{docApp.libraryHomeViewProduct.title || docApp.libraryHomeViewProduct.id}}
{{docApp.libraryHomeViewProduct.description}}
{{group.title || group.id}}
{{group.description}}
Mobile Security
- Article
- Mon Jul 31 2023
- 1 minutes to read
- 1 contributors
Mobile Device Protection
Hornbill Technologies requires mobile devices (laptops, mobile computers, PDAs, Mobile phones, Blackberrys, USB sticks, and other similar memory devices) to have password protection where appropriate/possible and to be encrypted.
Hornbill Technologies requires that notebook computers are physically protected against theft and damage while in transit, in storage, or in use and that, in cases of loss or theft, this is reported immediately.
Application Security
Hornbill Technologies requires that all the most recent operating system and application security-related patches, fixes, and updates have been installed.
Hornbill Technologies requires that notebook computers are backed up in line with the organization’s backup procedure.
Public Access Points
Hornbill Technologies requires users to comply with the organization’s requirements on the means of connecting to public access points and accessing the organization’s information. Hornbill Technologies requires users to act with care in public places so as to avoid the risk of screens and confidential notebook computer activity being overlooked by unauthorized persons.
Hornbill Technologies provides users with appropriate training and awareness to ensure that they understand the risks of wireless computing and that they understand and can carry out their agreed security obligations.
Working from Home
All remote workers and teleworkers working from home must use a security enabled wireless configuration where that is the preferred connection method and a secure connection (VPN) to the organization’s network. Remote workers must not transfer files from their own personal computers to Hornbill’s network and vice versa.
- Version {{docApp.book.version}}
- Node {{docApp.node}} / {{docApp.build}}