Search3 Results

SLAM provides many Systems to its users in pursuit of its mission and to enhance their productivity and jobs. These Systems include computers, software, communication tools (email, chat), access to internal networks (intranet), access to external networks (Internet), as well as telephone systems, voice mail, fax, photocopiers, etc. SLAM requires that these Systems be used in a responsible way, ethically, and in compliance with all legislation and other SLAM policies and contracts.
All systems must authenticate the identity of Users through individually assigned unique identifiers, known as user account IDs, and authentication tokens (e.g., password, key fob, biometrics and/or multifactor authentication). All users are accountable for all activity associated with their user accounts and authentication tokens.
To reduce the cybersecurity risk to the organization, SLAM is required to design, implement and maintain a coherent set of policies, standards and procedures (collectively the Security Program) to manage risks to its data and information systems. Users are required to protect and ensure the Confidentiality, Integrity, and Availability (CIA) of data and information systems, regardless of how data is created, distributed, or stored. Security controls will be tailored accordingly.