People Security
People Security Policy
Employee Confidentiality Agreements
All employees of Screendesk are required to read and accept the terms of a confidentiality agreement upon hire. This agreement states that they are prohibited from disclosing any company data from the systems and system components to which they have access. Screendesk ensures that these agreements comply with all applicable laws. The organization will not grant an employee access to any Screendesk assets without obtaining the employee's verified acknowledgment of the agreement.
Background Check Policy
Screendesk uses either an approved background check vendor or defined reference checks to perform background checks on individuals prior to their start date.
Security Awareness Training
All employees within Screendesk must undergo security awareness training within thirty (30) days of hire and at least annually thereafter.
The training accomplishes the following:
Ensure employees are aware of significant security issues that pose a credible threat to the organization, its network infrastructure, and its supporting system resources
Establish a comprehensive framework that effectively addresses the core components of security awareness, training, and education
Provide subject matter directly related to the safety and security of specific system components, especially those to which all users have access
Communicate the necessary response and resolution measures if employees suspect a security event or incident
The CTO monitors completion of security awareness training and follows up with employees who have not complied with the above requirement.
Performance
As part of maintaining information security standards, the CEO is required to complete performance appraisals for the CTO, and vice versa, at least annually. These appraisals should include an assessment of adherence to security policies and practices.
Given Screendesk's small size (2 employees), it's crucial that both team members are fully aligned on security practices and consistently implement them in their daily operations. Regular, open communication about security matters should be maintained between the CEO and CTO.
Last updated