Use of ATC Resources

We rely on the security of our cyber systems to conduct business, so we must use electronic resources responsibly and in accordance with company policies.

Electronic resources include ATC-issued devices as well as personal devices used to access ATC systems.

Commit to this:

  • Keep your passwords private.
  • Protect electronic devices and keep them locked when unattended.
  • Do not copy ATC information onto personal devices that do not adhere to ATC security requirements.
  • Do not use ephemeral messaging services or personal messaging applications without creating proper records.

It's Up to Us

Just a single click could let a hacker in. It’s up to all of us to stay alert. Do you know what steps to take to protect ATC’s information and networks? 

Software

Never download unapproved software to a company device.

Electronic Devices

Protect your electronic devices and keep them locked when unattended.

Personal Messaging and Email

Do not use personal messaging applications or personal email for conducting ATC business.

Suspicious Emails

Immediately report any suspicious emails to the IT Service Desk.

Passwords

Keep your passwords private.

Personal Devices

Do not copy ATC information onto personal devices that do not adhere to ATC security requirements.


Callout

Think about it this way:

Although they are intended for company business, there are times when it may be acceptable to use electronic resources for reasons not related to work. If you make a personal phone call or use the internet for a non-work matter, your use must be appropriate and not interfere with your ability to complete your job responsibilities.

Previous Course Home Next