We rely on the security of our cyber systems to conduct business, so we must use electronic resources responsibly and in accordance with company policies.
Electronic resources include ATC-issued devices as well as personal devices used to access ATC systems.
Commit to this:
Just a single click could let a hacker in. It’s up to all of us to stay alert. Do you know what steps to take to protect ATC’s information and networks?
Never download unapproved software to a company device.
Protect your electronic devices and keep them locked when unattended.
Do not use personal messaging applications or personal email for conducting ATC business.
Immediately report any suspicious emails to the IT Service Desk.
Keep your passwords private.
Do not copy ATC information onto personal devices that do not adhere to ATC security requirements.
Callout
Although they are intended for company business, there are times when it may be acceptable to use electronic resources for reasons not related to work. If you make a personal phone call or use the internet for a non-work matter, your use must be appropriate and not interfere with your ability to complete your job responsibilities.