Tuesday, 21 May 2024
13 Dhu al-Qi'dah 1445

Cyber Security Policy

Download: Cyber Security Policy(pdf) Or view the document in Flipbook format: Cyber Security Policy(flip book)


Data Protection

Leading technologies including encryption software is used to protect data and adherence to strict security standards are maintained to prevent unauthorized access


Storage Security

All electronic storage and transmission of personal data are secured and stored with appropriate security technologies


Encryption Manual

Download: Manual Enkripsi Microsoft Office Word 2013Manual Enkripsi Microsoft Office Excel 2013Manual Enkripsi Adobe Acrobat 2007Manual Enkripsi Microsoft Office Excel 2007Manual Enkripsi Microsoft Office Word 2007 and Manual Enkripsi Microsoft Office Word 2003