Dear colleagues,
January 28th is recognized in many countries around the world as Data Privacy Day. At Sony, we have a tradition of taking this day as another opportunity to raise awareness of the importance of good privacy and data protection practices throughout the company. This year Data Privacy Day has an even more poignant and personal meaning for Sony as some of our Sony Pictures colleagues have suffered first-hand what it's like to have their personal privacy violated in connection with a cyber-attack.
Please take a moment to ensure you are familiar with Sony's privacy policies and practices, which are highlighted on our Privacy Center(http://intranet.sca.sony.com/PrivacyCenter). Your local Privacy Officer can provide further guidance on policies that are specific to your company. Additionally, the following tips will remind you of some basic, but critical, steps you should take to ensure you are contributing to the privacy and security of Sony's most sensitive information:
Passwords:
It is always best practice to use complex passwords or passphrases including lowercase and uppercase letters, numbers and symbols, the longer the better. If you struggle remembering complex passwords you could use a memorable phrase (a passphrase [e.g., ILuv2PlayB@$ketb@11!]).
Never share passwords or passphrases with others or use the same one across different sites and systems. Do not store passwords or passphrases in electronic files such as in Word, Excel or text files unless encrypted. If you would like advice on tools that can be used to maintain and help you keep track of your passwords and passphrases, contact your local Information Security or Privacy team.
Phishing E-mails:
One of the most common methods that hackers use to steal personal information is through installation of malware on employee computer systems. This often happens by sending employees a "phishing" e-mail with a file attachment or Web link that will result in the installation of such malware. Be wary of unexpected e-mails or any e-mail with an attachment or Web link that you didn't expect. Confirm the identity of the sender before opening the attachment, clicking on the link, or forwarding the e-mail.
Similarly, be cautious if you receive an e-mail explicitly requesting sensitive or personal information. Remember: even an e-mail from a friend or colleague could contain a link to a dangerous site or a malicious request for information if that person's account has been hijacked or if the e-mail was "spoofed" to appear to have been sent from your friend (hackers can easily make the "from" e-mail address whatever they choose). When in doubt, ask your local Information Security team.
Laptops:
Lock your laptop in a secure location when not in your possession. Never leave your laptop unattended in public places. If your work space is not secure, consider using a computer cable lock, which can be provided by your IT Help Desk.
Do not store sensitive personal information on a laptop hard drive unless it is absolutely necessary to support business operations, and only if the hard drive is encrypted. Sensitive personal information should not be stored on a laptop hard drive any longer than necessary to support business requirements.
Be Wary:
If you receive a request for sensitive information via phone or e-mail, verify the identity of the requester and his/her authority to receive such information before sharing. If you do determine it’s appropriate to share, remember to do so in a secure manner.
Be Educated:
Be aware of Sony's Global Basic Principles on Personal Information(http://intranet.sca.sony.com/sites/sca/files/documents/policies/basic_principles_personal_info.pdf) and Sony's Global Information Security Standards(http://intranet.sca.sony.com/GlobalInformationSecurityPolicyStandards). Understand your responsibilities and the critical role that you play in securing sensitive personal information.
You can find additional information security and privacy tips at:
.
I encourage you to take these tools and treat every day as Data Privacy Day. Privacy requires a team effort, and every employee has a role to play. Thank you all for your continued support of this important topic.
John Scimone
Chief Information Security Officer
Sony Corporation
Dear colleagues,
January 28th is recognized in many countries around the world as Data Privacy Day. At Sony, we have a tradition of taking this day as another opportunity to raise awareness of the importance of good privacy and data protection practices throughout the company. This year Data Privacy Day has an even more poignant and personal meaning for Sony as some of our Sony Pictures colleagues have suffered first-hand what it's like to have their personal privacy violated in connection with a cyber-attack.
Please take a moment to ensure you are familiar with Sony's privacy policies and practices, which are highlighted on our Privacy Center(http://intranet.sca.sony.com/PrivacyCenter). Your local Privacy Officer can provide further guidance on policies that are specific to your company. Additionally, the following tips will remind you of some basic, but critical, steps you should take to ensure you are contributing to the privacy and security of Sony's most sensitive information:
Passwords:
It is always best practice to use complex passwords or passphrases including lowercase and uppercase letters, numbers and symbols, the longer the better. If you struggle remembering complex passwords you could use a memorable phrase (a passphrase [e.g., ILuv2PlayB@$ketb@11!]).
Never share passwords or passphrases with others or use the same one across different sites and systems. Do not store passwords or passphrases in electronic files such as in Word, Excel or text files unless encrypted. If you would like advice on tools that can be used to maintain and help you keep track of your passwords and passphrases, contact your local Information Security or Privacy team.
Phishing E-mails:
One of the most common methods that hackers use to steal personal information is through installation of malware on employee computer systems. This often happens by sending employees a "phishing" e-mail with a file attachment or Web link that will result in the installation of such malware. Be wary of unexpected e-mails or any e-mail with an attachment or Web link that you didn't expect. Confirm the identity of the sender before opening the attachment, clicking on the link, or forwarding the e-mail.
Similarly, be cautious if you receive an e-mail explicitly requesting sensitive or personal information. Remember: even an e-mail from a friend or colleague could contain a link to a dangerous site or a malicious request for information if that person's account has been hijacked or if the e-mail was "spoofed" to appear to have been sent from your friend (hackers can easily make the "from" e-mail address whatever they choose). When in doubt, ask your local Information Security team.
Laptops:
Lock your laptop in a secure location when not in your possession. Never leave your laptop unattended in public places. If your work space is not secure, consider using a computer cable lock, which can be provided by your IT Help Desk.
Do not store sensitive personal information on a laptop hard drive unless it is absolutely necessary to support business operations, and only if the hard drive is encrypted. Sensitive personal information should not be stored on a laptop hard drive any longer than necessary to support business requirements.
Be Wary:
If you receive a request for sensitive information via phone or e-mail, verify the identity of the requester and his/her authority to receive such information before sharing. If you do determine it’s appropriate to share, remember to do so in a secure manner.
Be Educated:
Be aware of Sony's Global Basic Principles on Personal Information(http://intranet.sca.sony.com/sites/sca/files/documents/policies/basic_principles_personal_info.pdf) and Sony's Global Information Security Standards(http://intranet.sca.sony.com/GlobalInformationSecurityPolicyStandards). Understand your responsibilities and the critical role that you play in securing sensitive personal information.
You can find additional information security and privacy tips at:
.
I encourage you to take these tools and treat every day as Data Privacy Day. Privacy requires a team effort, and every employee has a role to play. Thank you all for your continued support of this important topic.
John Scimone
Chief Information Security Officer
Sony Corporation
การแปล กรุณารอสักครู่..