RAISING INFORMATION SECURITY AWARENESS

→  We do everything we can to ensure that the UVeye brand is protected.

→  We implement information security controls to keep our information assets confidential to prevent unauthorized disclosure.

→  We verify the integrity of information is maintained against unauthorized modification.

→  We implement continuity controls to make sure our data and systems are available when required by UVeye business processes.

→  We allow access to information assets and technical resources to authorized persons with justifiable business needs.

→  We promote information security education, awareness & training to identify the Cyber threats UVeye is facing & respond appropriately to cyber-attacks.

→  Everything we do is in line with the regulatory obligations and requirements to which we are committed.

→  We monitor and measure the information security performance to improve and raise the organizational level of our protections.

REMEMBER - SECURITY STARTS WITH YOU!

INFORMATION SECURITY CONTROL | OCT 2021

→ PLEASE READ THE FOLLOWING GUIDELINES CAREFULLY AND SIGN AT THE BOTTOM OF THE PAGE

For any questions please contact security@uveye.com

UVEYE INFORMATION & INTELLECTUAL PROPERTY (IP) 

•   We classify UVeye information into three confidentiality levels; ‘Public’,  ‘Internal’ & ‘Confidential’ –

Public: Information approved for public disclosure by the company management.

Internal: Information available to employees and authorized partners, and clients.

Confidential: Information that is extremely sensitive or private, and intended for use by named individuals only.

•   Not sure what to do with the information under your hand? Contact the CISO/COO.

•   Please verify that the information is stored in places designated for it (e.g., email, Drive, SaaS systems, etc.).

•   When sharing information either internally or externally, make sure you’re sharing the correct information
with the correct correspondent and always remember to remove the share once it is no longer required.

•   If internal or confidential information has reached the wrong recipient or has been disclosed without permission,
please update the CISO/COO immediately.

 

PHYSICAL SECURITY

•   Security cameras are installed at the main entrances as a deterrent for unauthorized access and to record all entries.

•   Access to the company premises requires a personal badge. Should you lose your badge, please notify the office managers ASAP
so that they can immediately revoke the badge.

•   If you notice suspicious or unauthorized people entering the office (basically anyone that you don’t recognize),
please ask them for their identity and for the purpose of their visit. 

•   If you are hosting people outside the company, please meet them at the reception 4th floor) and accompany them during their entire stay at the office.

•   If you use printed information containing the company’s internal/confidential information, please be sure to collect them from the printer/conference rooms
and keep them secure.

•   Information that has been printed and is no longer required should be shredded and placed in the designated disposal bin.

•   Remember to lock your laptop before leaving your desk.

•   Be sure not to disclose any company information in conversations held in public places, restaurants, elevators, etc.

 

MOBILE DEVICES & WORKING FROM OUTSIDE THE OFFICE

•   The use of laptops is for authorized business purposes only.

•   Access to company information is for authorized users only.

•   Use Multi-Factor Authentication (MFA) when accessing SaaS resources.

•   Don’t install unmanaged or unauthorized software on your laptop since it may be a license breach or can lead to an exploit,
a software vulnerability, or a cyber-attack. If you are uncertain, contact IT for assistance.

•   Secure/Lock your devices before leaving your work area to prevent unauthorized access.

•   Don’t change your laptop security settings (e.g., antimalware protection).

•   Laptops and mobile devices should not be left unattended in public places.

•   If your laptop is lost or stolen, please report it to the IT team as soon as possible.

•   We don’t backup laptops. Please store company information in the approved storage (e.g., local file storage, Google Drive, etc.).

•   When using a Disk-On-Key or portable hard drive, keep it secure and delete it when you don’t need it anymore to prevent a potential data breach
or possible business data disclosure.

•   And lastly, don’t open emails from suspicious sources, as they may contain information that will entice you to share information or click on a link
that will cause a phishing attack.  If you accidentally click on a link or something unusual happened, please immediately report it to the IT team.

 

USING COMPANY RESOURCES

•   You have been given access to the company’s resources; use them for work purposes only.

•   The first line of defense is the password we use to access our resources. You must follow the company policy and keep your password secure, private,
and unique.  Remember to change your passwords frequently and to pick ones that are hard to guess.

•   Never share your credentials (i.e., usernames and passwords). Remember, the IT team will never ask you for your password.

•   When selecting a password, use a unique password that is different from other services you may use. If you suspect that your password has been compromised,
you must immediately report that to the company CISO/COO.

•   Access to cloud applications (our SaaS resources) is approved using Multi-Factor Authentication (MFA) only.
If you need access to SaaS applications that don’t support MFA, please consult IT and Security first.

•   Avoid accessing websites that potentially contain malicious content (e.g., gaming, gambling, nudity, etc.) using the company laptops.

•   When you receive an email from an unknown sender, use caution, as it may be a phishing email. If you think you received a phishing email, delete it immediately
and notify IT. Especially watch for email senders that use suspicious or misleading domain names. Remember, other employees might also receive that email. 

•   Do not click on links or attachments from senders that you do not recognize. Be especially wary of .zip files or other compressed or executable file types.

•   If you can’t tell if an email is legitimate or not, please report it to the IT team immediately.

•   If your computer is not working properly, please notify IT immediately.