Tuesday, 19 March 2024
09 Ramadan 1445
bluegreengoldred

Cyber Security Policy

Download: Cyber Security Policy(pdf) Or view the document in Flipbook format: Cyber Security Policy(flip book)

 

Data Protection

Leading technologies including encryption software is used to protect data and adherence to strict security standards are maintained to prevent unauthorized access

 

Storage Security

All electronic storage and transmission of personal data are secured and stored with appropriate security technologies

 

Encryption Manual

Download: Manual Enkripsi Microsoft Office Word 2013Manual Enkripsi Microsoft Office Excel 2013Manual Enkripsi Adobe Acrobat 2007Manual Enkripsi Microsoft Office Excel 2007Manual Enkripsi Microsoft Office Word 2007 and Manual Enkripsi Microsoft Office Word 2003