1. Office Security

  1. Employees must ensure that company items such as mobile phones and computers issued to them for official use are secure when not in use.
  2. The main office doors are to be secured with card or coded access controls throughout the night.

2. Information Security (documentary or digital)

  1. Hard copies of confidential documents are to be kept under lock and key, when not in use and if an employee is away from the workstation.
  2. Faxed document containing confidential information should not be recycled as draft paper for re-use.
  3. PCs (including personal computers, notebooks, laptops, etc.) and hard disks with confidential digital data should be protected with passwords.
  4. Screensaver on workstations to be used and protected by password to avoid access when away.
  5. PCs must be switched off when leaving the office for the day.

3. Restrictions on Confidential Information

  1. Every employee undertakes that both during and after the term of employment with the Company, the employee will not use, divulge or communicate to any person (other than those whose job duty is to know the same or with proper authority to do so) any of the trade secrets or other confidential information of the Company, including the particular lists or details of customers and clients of the Company.

4. IT Securities, Policies and Practices

  1. The term “computer resources” shall refer to all computers, IT infrastructure, and information, communication equipment, operating business systems and IT services.
  2. The term “electronic information” refers to all information that is created, distributed, published, and stored using computer resources including information that has been stored on external devices such as floppy disks, thumb drives, CD-ROM media as well as printed paper via computer resources.
  3. Prohibitions Relating to Emails:
    1. Do not write down user ID and password or tell them to another person.
    2. Do not open suspicious email or attachments, but delete them immediately.
    3. Do not send emails pretending to be someone else.
    4. Beware of spams or other damaging emails.
    5. Be sure of the right to be able to email out third party information.
    6. Be sure of right to solicit, promote or advertise product or service through email.
    7. Do not send out any emails construed as harassment or disparagement of others.
    8. Do not send or receive any emails containing information which is immoral, offensive, religious, communal or political grounds or is abusive or of an indecent, obscene, pornography or menacing character.
    9. Do not forward or propagate chain emails.
  4. Prohibitions Relating to Internet/Intranet/Extranet
    1. Do not publish or link information on Company’s website without the approval of a Director or CEO.
    2. Do not access any websites unrelated to your work (e.g. games, pornography, blogs and etc.).
    3. Do not download, possess, exchange, make copies of, or distribute any copyrighted contents without the permission of the author as these actions violate copyright laws.
    4. Do not write any libelous comments about other people on any electronic message boards.
    5. Do not give out any personal information including credit card numbers on the Internet unless the site is encrypted (e.g. the URL begins with https://).
    6. Do not transmit or retrieve information containing obscene, indecent, lewd, or lascivious material.
    7. Do not use company Internet access for personal financial gain and/or profits including online gambling, online betting and online trading of shares/stocks and bonds.
  5. Procedures Relating to PCs (Desktop or Laptop Computers, Notebook, etc.):
    1. Set up PCs with monitors that require passwords to be opened.
    2. Turn off PCs when leaving work.
    3. Check that updated versions of anti-virus software are installed.
    4. Run windows update to patch up windows operation system regularly.
    5. Do not install any software or hardware that is not related to work.
    6. Take all precautions if laptops or storage devices are taken out of office that the devices or information is not lost or stolen.
    7. If information is lost or stolen, the employee has to notify the supervising Director or the CEO.
    8. Ensure files from PCs are automatically saved on the Servers.
  6. Printers, Scanners, Fax and Photocopy machines
    1. Collect all documents without delay from printer, fax machine and photocopier.
    2. Avoid using printers, scanners, fax machine and photocopy machine for non-work related matters.
    3. Use only original or approved cartridges.

Signed on: 2 November 2020

Mr. Leong Tim Fook

Mr. Leong Tim Fook
Compliance Director
Southland Global Pte. Ltd.

Learn more about Our Sustainability Policies