Compliance 3
Across
- 3. ________ email sending shall be prohibited. (Information Security Policy)
- 6. The ________ gifts should NOT be given to vendor/supplier China Mobile subsidiaries, government institutions and HQ of PRC state-owned enterprises. (Gift policy)
- 7. Access log records in site access control and surveillance systems shall be kept for a minimum of ____ days. (Information Security Policy)
- 8. ________ units have the responsibility to monitor public sentiment within the scope of business. (Public Sentiment Management Policy)
- 9. ______ refers to a situation in which a person decides to report serious concerns about any suspected misconduct, malpractice or irregularity within the Company. (internal control policy)
Down
- 1. _______ committee conducts the meeting which is responsible for sourcing, and make the approval in accordance with the relevant provisions of the ______ policy. (conference management policy)
- 2. The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)
- 4. All units can provide their preferred gift suggestions. __________ Division will evaluate and add the executable gifts to the list prepared in the middle and end of the year. (Gift policy)
- 5. Three types of _________ Sponsorships are available to staff: team nomination, professional membership and professional certification examination sponsorship. (Education Sponsorships Policy)
- 10. Passwords shall be ____ or more characters. (Information Security Policy)