Across
- 1. Grants access based on job responsibilities.
- 5. Training staff to recognize and respond to security threats.
- 6. Ensuring sensitive information is not disclosed to unauthorized people.
- 9. Removing system access when an employee leaves or changes roles.
- 10. The policy for Keeping workspaces free of exposed confidential information.
Down
- 2. Employer’s process to verify a candidate’s history.
- 3. Protecting personal information from misuse or exposure.
- 4. Guidelines/Policy for proper use of company systems and data.
- 7. Policy for creating and managing secure login credentials.
- 8. Policy for how long data is stored before deletion
