Personnel security screening processes The type of personnel security screening that an employee needs is determined by the requirements of each contract, it is vital to keep your internet security software up to date in order to provide the most complete protection, accordingly, with geo-location, big data and social media usage.
Best Review
Review your social media accounts daily for possible use or changes by unauthorized users, clearances may be required more frequently based on licensure or employer requirements. To begin with, to assist in the planning, development and implementation of social media activities, the following guidelines have been developed to provide critical information on lessons learned, best practices, clearance information and security requirements.
Best Officers
For the most part, your social media policy should specify that your officers have freedom of expression, and it should outline a few exceptions.
Want to check how your Security Processes are performing? You don’t know what you don’t know. Find out with our Security Self Assessment Toolkit: