Course Content
Cybersecurity Awareness for Corporate Teams

4.1 Understanding Corporate Security Policies

  • Acceptable Use Policy (AUP): This is the contract between the employee and the organization regarding technology.

    • Key Rule: Corporate devices are for business use. Minimal personal use is often permitted, but high-risk activities (illegal downloads, gambling sites, adult content) are strictly prohibited as they introduce malware risks.

  • Clean Desk Policy:

    • Designed to prevent “visual hacking” or theft of physical data.

    • Requirement: No sensitive documents left on desks overnight. Whiteboards must be erased after meetings. Passwords must never be written on sticky notes.

  • BYOD (Bring Your Own Device) Policy:

    • If you use a personal phone for email, it must meet security standards (e.g., must have a 6-digit passcode, must be encrypted).

    • Remote Wipe: The company reserves the right to wipe corporate data from your personal device if it is lost or if you leave the company.