Learn how to use Grai Technologies Ltd's IT resources securely and responsibly
All staff · 11 sections
🔒 Why This Training Matters
1 / 11
As staff members of Grai Technologies Ltd, we all have a role to play in protecting the organisation's IT resources and data. This training will help you understand the acceptable use policy and how t
Key Takeaway: Understand the importance of following the acceptable use policy
📚 Purpose and Scope
2 / 11
The policy applies to all company devices, networks, and data
All staff members must comply with the policy
Violations may result in disciplinary action, including termination
The policy is in place to protect the organisation and its staff members
Key Takeaway: Understand the purpose and scope of the acceptable use policy
🖥️ Acceptable Use
3 / 11
Company devices are for business use, with limited personal use permitted
Only use approved software, and request exceptions through IT
Lock your workstation when away using Windows+L or Cmd+Ctrl+Q
Never share your credentials with anyone
Key Takeaway: Understand the guidelines for acceptable use of IT resources
⚠️ Prohibited Activities
4 / 11
Accessing or sharing illegal, offensive, or explicit material is prohibited
Using company resources for personal financial gain or crypto mining is prohibited
Using personal USB devices or unauthorised peripherals is prohibited
Bypassing security measures or engaging in prohibited activities is prohibited
Key Takeaway: Understand what activities are prohibited when using IT resources
📊 Data Handling
5 / 11
Data is classified into four categories: Public, Internal, Confidential, and Restricted
Confidential data should not be stored on personal devices or in the cloud
External transfers of confidential data should use approved secure methods
Treat uncertain data as Confidential and handle it accordingly
Key Takeaway: Understand how to handle data securely
📧 Email
6 / 11
Do not use company email for personal service registration
Verify sender identities before clicking on links
Report phishing emails using the Report Phish button or security@grai.ie
Do not auto-forward email to external addresses
Key Takeaway: Understand how to use email securely
💻 Remote Work
7 / 11
Use a VPN to access internal resources when working remotely
Do not use public Wi-Fi without a VPN
Shield your screen from others in public
Never leave devices unattended in public areas
Key Takeaway: Understand how to work remotely securely
🚨 Incident Reporting
8 / 11
Report security incidents immediately to security@grai.ie or ext 4400
Do not investigate incidents yourself
No penalties for good-faith reporting
Failure to report incidents is a violation
Key Takeaway: Understand how to report security incidents
🕵️♂️ Monitoring
9 / 11
The organisation monitors all IT resource use
No expectation of privacy on company systems
Monitoring helps detect and prevent security incidents
Key Takeaway: Understand that IT resource use is monitored
⚖️ Enforcement
10 / 11
The organisation enforces the acceptable use policy
Disciplinary procedures apply to policy violations
Serious violations may result in severe consequences
Key Takeaway: Understand the consequences of policy violations
✅ Recap and Next Steps
11 / 11
Understand the acceptable use policy and its importance
Follow guidelines for acceptable use, prohibited activities, and data handling
Report incidents and follow incident reporting procedures
Understand the consequences of policy violations
Key Takeaway: Recap the key takeaways from the training