End User Information Security & Privacy Awareness
This guide provides essential knowledge to empower employees in protecting information, maintaining privacy, and supporting a secure workplace environment. Whether working onsite, remotely, or using personal devices, your vigilance matters. Understanding your role and responsibilities is critical to safeguarding our organization's data and assets from evolving digital threats.
Throughout this presentation, we will cover incident handling, privacy duties, secure remote work, and more to help you become an informed and proactive security participant.

by Deepesh Chitroda

Handling Information Security Incidents
1
Recognize Suspicious Activity
Identify phishing attempts, unauthorized access, or unusual system behavior promptly.
2
Report Immediately
Notify security teams without delay to limit potential damage and investigate events thoroughly.
3
Follow Response Procedures
Adhere to incident handling protocols and cooperate fully during investigations for effective resolution.
Your Data Privacy Responsibilities

Information Security Policy

Know the Policies Familiarize yourself with all security policies that govern data handling and IT usage. Mandatory Compliance Non-compliance risks data breaches and disciplinary action. Following policies protects everyone.

Access Control
Only access personal or sensitive data when necessary for your role.
Data Sharing
Share information carefully and only with authorized parties following company policies.
Compliance
Abide by relevant privacy laws and internal standards to protect customer and employee data.
Secure Practices for Remote Working
Use Secure Devices
Ensure your device meets security standards and is regularly updated.
Use VPN and Avoid Public Wi-Fi
Always connect through VPN; public Wi-Fi lacks adequate protection.
Maintain Privacy
Lock screens and work in private spaces to keep information confidential.
Malware and Threat Awareness
Spot Suspicious Content
Be cautious with unexpected links, attachments, and pop-ups that may harbor malware.
Do Not Click
Avoid engaging with anything suspicious to prevent infection or data compromise.
Report Threats
Inform IT security immediately to facilitate prompt response and containment.
Acceptable Use and BYOD Security
Acceptable Usage
Use company IT resources responsibly; avoid unauthorized apps and personal misuse.
BYOD Compliance
Ensure personal devices comply with company policies for security and data protection.
Work Data Storage
Store work-related information only on authorized devices to prevent leaks.
Safe Web Usage and Privileged Access
Safe Browsing
Visit trusted sites, avoid risky downloads, and reject suspicious pop-ups.
Privileged Access
Use admin credentials only for authorized tasks and protect them diligently.
Your Commitment to Security
1
1
Stay Alert
Be constantly vigilant for security threats in your daily work activities.
2
2
Follow Best Practices
Adhere to all security policies, training, and recommended protective measures.
3
3
Report Issues
Promptly escalate suspicious activity or security concerns to the appropriate teams.
By committing to these principles, you become an essential part of our organizational defense and help create a safe, resilient workplace for all.

By clicking submit button, I confirm that I have read, understood, and will follow the information security and privacy responsibilities outlined in this guide, and will promptly report any security concerns.
Submit
NUK 9 Information Security Auditors LLP [NUK 9 Auditors]
E702, Arjun, NL Complex, Anand Nagar, Dahisar East
Mumbai, Maharashtra - 400068. India
This material, including all content, graphics, systems, and tools referenced or used herein, is the intellectual property of NUK 9 Auditors. Unauthorized copying, distribution, modification, or use of this material or related systems is strictly prohibited and may result in disciplinary or legal action.
Use of content is permitted only for internal team, it's contracted services and authorized purposes in accordance with company policies.