1 Guidelines
Every time you visit external websites and applications, you may be exposing sensitive Merck information to security risks. Strictly follow the guidelines of acceptable use of Merck-provided devices and technology.
2 PCs & Notebooks
Do not change default security settings!
Merck laptops are automatically configured to protect the device from known cyber risks. Desktop firewalls, anti-malware solutions, and hard disk encryption are some of the many settings that protect your device from misuse.
Thus, it is important that these settings are not manually changed at any point in time.
Do not install unauthorized hardware and software!
Only use hardware and software that is approved by Merck Information Security. Unauthorized or unlicensed software may not only harm your device but also may lead to legal consequences.
In the beginning of the chapter Sharon was using ICQ for private and business purposes. According to the policy on the acceptable use of Merck devices, the installation and use of ICQ is not allowed.
Visit the information security portal to learn more:
Information Security Portal
3 E-Mail Address
Your Merck e-mail address is only for business use – and that’s for a reason!
Never use your Merck e-mail address for registration on personal websites, social media networks, or mailing lists!
Never process private e-mails within your Merck e-mail program (e.g., Outlook).
For example:
By using your Merck e-mail address to register on Facebook, you may be identified as a Merck employee and could therefore make yourself a valuable target for social engineering attacks.
If you register with your Merck e-mail address in mailing lists, you expose your address to spam attacks.
Keep your business account to business ONLY!
4 Company Devices
Process Merck information on approved devices!
Merck information that is classified as ‘Internal’ or above may only be processed on Merck devices, via Merck Desktop on Demand (DoD)
or on devices that adhere to approved Merck BYOD policies.
Do not share your Merck device!
You have been given a Merck device to carry out Merck business activities, and you are accountable for the device and its content. Therefore, never share your Merck devices – not even with your best friend.
5 Take away
Only use Merck-approved hardware and software.
Do not modify the default security settings or disable security software on your Merck device.
Sensitive Merck information may only be processed and stored on dedicated Merck devices.
Never install unauthorized and unlicensed software on Merck devices.
Never use your Merck e-mail address for private purposes.
Never share your Merck devices with others.
Never process private e-mails via your Merck e-mail program (e.g., Notes or Outlook).
6 Summary
Merck devices are provided to you for business purposes and you are expected to use them for this purpose only.
Now that you are aware of how to use your Merck devices, in the next chapter you will learn how to classify and label Merck Group Information and why this is important.