Cyber Security Policy Manual

10) Suppliers, contractors or consultants must not engage in activities that might harm City’s IT resources. This includes introducing computer viruses, sending spam emails, disrupting services, damaging files or making unauthorized changes to software or information. 11) Suppliers, contractors or consultants must not attempt to circumvent any information security measure s that have been implemented to protect the City’s systems and information. This includes but not limited to using hacking or password cracking programs in an attempt to gain unauthorized access to systems or information.

Cyber Security Policy Manual

30

Made with FlippingBook Annual report