Unsecured access to data, a transferred or stolen device and/or other breaches can compromise data or even allow an unlicensed party to access your entire company network. As a result, all staff (including contractors and suppliers with access to enterprise systems) are responsible for taking appropriate steps, as outlined below, to secure their connections, equipment and data. Don`t leave your devices or laptop in the car. If you need to, then hide them from the point of view. The tribe is the safest place. Do not use this time for personal items and groceries. It is not intended for shopping, tasks or appointments. Permission is required by your supervisor as for a daily job in the office. We strive to provide as much IT support as possible as staff move away. Avoid public Wi-Fi.
Use personal hotspots or encrypt your connection. Your VPN encrypts your connection to the corporate network. You should always use your VPN when working remotely. When your VPN is connected, you can link corporate network drives to your remote computer and access your files as if you were connected to your desktop. It is an agreement between [#company name] (“employer” or “company”) and [#employee name] (“The worker”), which sets the conditions for regular work in another location (for example. B on the same days per month or on a routine basis). Telework allows employees to work from home, on the go or on a satellite site throughout their work week. [Company name] considers telework to be a workable and flexible work option when the employee and the workplace are suitable for such an agreement. Telework may be suitable for some employees and jobs, but not for others.
Telework is not a claim, it is not a company-wide benefit and it does not change the terms of employment with [company name]. This directive applies to employees whose primary job is not in our offices. Watch out for email phishing. When many people work remotely, email correspondence is more frequent and more important than ever. Beware of spam or falsified emails, and report all suspects. It is better to be too suspicious than to be the victim of a phishing attempt. However, if you click on a link, attachment or provides you with login information to an email that you later suspect to be spam, report it immediately email@example.com. Do not worry. You won`t have any problems. It happens to the best of us.
What is important is a quick response. Is used for access to remote network drives and other on-site resources. Constantly check all forms of communication. You don`t want unanswered messages from colleagues to make people think you`re not working. Another possibility is to find a quiet place near your home, which offers wi-fi like a café, library or coworking space. Those who can control their focus can produce more and better work in less time. This will give you the freedom to be ahead of the game. The Business app is installed on your remote computer, called a customer. You connect to the Business app to access your Office computer from the customer. Beware of your personal environment in public places. If you sit next to the exit from a café, you are “caught and caught” by armed robberies.
The open display of a mobile device or laptop on public transport (especially through the doors) makes you a target for theft and risks your personal safety. Consider sitting away from the entrance. Make sure your calendar shows that you are working remotely. Before a telework agreement is reached, staff and manager, with the help of the human resources department, will assess the adequacy of such an agreement and verify the following areas: 6. The employee undertakes to return the equipment, recordings and equipment of the inter