Across
- 5. Completion of Information Security and DPA annual training is ____________
- 7. When you receive an email with a link to a bogus website it is called _________
- 9. A type of use that should be limited when using Society systems ________
- 10. This should only be installed on Society systems by approved administrators ______
- 11. Something that can infect a PC/Laptop is known as a ________
- 13. Personal information is protected by this act _______
- 14. All colleagues must comply with these information security documents _______
- 16. This should be worn at all times when on Society premises __________
- 17. You should not allow others to do this when accessing Society premises ______
Down
- 1. Always ensure your _________ is locked when you are away from your computer.
- 2. A tidy desk is also known as a _________ desk
- 3. When you received unsolicited email from unknown sources this is called ______
- 4. These should never be shared __________
- 6. It should be changed immediately if suspected of being compromised
- 8. Information Security policies are published on it ___________
- 12. Skipton may ______________ your internet usage
- 15. Personal journal published on the World Wide Web ________
