IT Charter
IT Charter
IT Charter
This Information Security Charter for end users (ISC) is a synthesis of the security requirements spread in all SE policies.
1- The Principles of IT security list the responsibilities and accountabilities every user shall understand and acknowledge.
2- The Acceptable use of information systems provides the best secured practices for every IT platform and usage
3- Useful links & Glossary will help users to find the most relevant documentation and support.
Dedicated awareness programs will help users to better understand those requirements and to actively improve their conduct.
This charter is the corporate reference for all SE IT systems in all SE entities. These entities must implement this charter in enforceable
local provisions which bind employees and partners in accordance with national legislation.
Principles of IT security
Useful links
IT Security policies and awareness (charter, tutorials, presentations …)
http://ipo.schneider-electric.com/itsecurity
Visit other IPO pages for service-catalog and organization
Prevent loss & theft Prevent Loss / Theft & Denial of service
- Lock your equipment (PC, laptop, storage disk) to your desktop - Outside the office, never leave SE mobile devices unattended
with a protection cable - Inform SE immediately if the device is lost or stolen
- Store your mobile IT (Laptop, backup disk, USB key) in a - Back up the content of the device because it can be remotely
locked desk, drawer, or safe when you are not using it and wiped in the event of theft, loss or on request of authorized
never leave it unsecured after business hours or on vacation. personnel like HR, legal or the management
- When travelling, keep your mobile IT with you at all times; never
leave it in unsecured locations Prevent Hacking / Spying / Social engineering
- Immediately inform SE of any loss or theft of IT equipment - Limit your disclosure of information and always check the
identity and origin of a strange call (name, phone number…)
Prevent Spying & Hacking - Do not use external Internet telephony without SE approval
- Never transfer CONFIDENTIAL files to mobile IT devices - In addition to your PIN code (which does not protect embedded
(laptop, removable media) without enhanced security data), activate the automatic screen lock with password control
(encryption, user access control)
- Do not insert removable media into your PC if you don't trust its - If necessary, encrypt sensitive data (agenda, mail, contacts…)
origin (usb key found on the floor, advertising, visitor…). - Compliance with all other security requirements (information
- Do not insert your personal removable media in a third party PC protection, software, network access, web usage, mailing, …)
if you don't trust its owner (internet cafe, prospect, visitor).
- If your business requires such unsecured behavior, use specific Personal device: Unless you have signed a BYOD agreement
mobile IT devices without any sensitive data nor SE connection • You must not transfer SE data to any personal device
capability, and scan them (antivirus) before returning to SE. (smartphone, iPad, home PC…) or service (email, storage …).
• You must not connect personal devices (laptop, smartphone) to
the SE network even for business purposes
Social media
Web usage Prevent Failure / Misuse
- Unless authorized (e.g. Marketing), do not post SE information
Prevent Failure / Misuse on social media
- Demonstrate responsibility in your web usage - Only use social media channels authorized by SE and do not
- Do not visit sexual, pornographic, violent content or content that add any page without SE owner’s approval.
violates any SE policy or local legislation (consult your local HR) - When you post proprietary information, comply with copyright,
- Don’t consume excessive bandwidth (streaming, large files…) trademark, privacy and other applicable law.
- Avoid Internet-related distractions from non-business-related - Use common sense and courtesy, post respectful comments,
work (e.g., games, social networking, shopping…) respect discrimination policies and values whatever your country
or culture.
Prevent Hacking
- “Peer-to-peer” (P2P) sharing of files is strictly forbidden. Prevent Spying / Social engineering
- Don’t click on pop-ups you don’t trust (bargains, lottery win…) - Never communicate any SE CONFIDENTIAL information (new
product, R&D, financial results, trends, legal matters & litigation)
Prevent Spying / Social engineering - Never communicate to the press (restricted to spokespeople)
- Do not fill in web inquiries and online profiles with too many - Be transparent, never represent yourself in a misleading way.
details on your business or your private life - Before posting any content, always double-check the identity
- Never authorize websites to memorize your credit card number and email address of your contact.
for further visits (prioritized targets for cybercrime and hackers).
Security incidents
Incidents can also be detected by monitoring systems (see
- Call IPO service desk (29.29) in case of security issue suspicion Principle of security N°5). All SE controls comply with SE
- Highlight all unusual IT behaviors (yours and your PCs) and any policies, labor laws and legal requirements.
potential business impacts (ex: confidential data leakage) - Monitoring history is available upon audit request to control
- To facilitate technical investigations, do not erase access history, acceptable use (e.g., web usage, sensitive data access, etc…)
temporary internet files, etc... - SE reserves the right to restrict, suspend or close accounts or
usage of equipments or services at any time
- Fully collaborate with IPO and security support
Schneider
p 3/4 Electric
- Division - Name –- Date
- RESTRICTED p3/4 3
Glossary