Across
- 2. Business names, Garda arival, coin order, cash amounts transfered
- 4. Bundling/Clipping money and keeping drawer____
- 8. Processes and methodologies designed to protect sensitive information
- 9. Have a password protect _____ for all private information
- 10. Locking your _____ anytime you walk away from station
- 12. If you leave our desk/computer do this
- 13. Limit for bottom drawer
- 14. Keep your security codes ____
Down
- 1. Limit for top drawer
- 3. Before you leave at night do this to your workstation PC
- 5. Handwritten notes, documents, account numbers
- 6. Print, Electronic, Verbal
- 7. None of these items in your drawer
- 11. Email, OSI, Velocity, Online check orders
