Page 2 of 3 Electronic Communications and Data Security – Global
• Safeguard information against unauthorized disclosure, use, access, modification and destruction.
• Safeguard the security of user IDs, passwords and personal identification numbers (PINs).
• Properly secure computers and other ACE Technology devices when left unattended.
• Not attempt to breach or bypass assigned system and data access limitations.
• Promptly notify systems support staff when user access needs change.