Across
- 3. Personal journal published on the World Wide Web ________
- 5. All colleagues must comply with these information security documents _______
- 8. Personal information is protected by this act _______
- 10. These should never be shared __________
- 12. It should be changed immediately if suspected of being compromised
- 13. Information Security policies are published on it ___________
- 14. Always ensure your _________ is locked when you are away from your computer.
- 15. A tidy desk is also known as a _________ desk
- 16. When you received unsolicited email from unknown sources this is called ______
Down
- 1. You should not allow others to do this when accessing Society premises ______
- 2. Skipton may ______________ your internet usage
- 4. Completion of Information Security and DPA annual training is ____________
- 5. When you receive an email with a link to a bogus website it is called _________
- 6. This should be worn at all times when on Society premises __________
- 7. This should only be installed on Society systems by approved administrators ______
- 9. A type of use that should be limited when using Society systems ________
- 11. Something that can infect a PC/Laptop is known as a ________
