Beruflich Dokumente
Kultur Dokumente
INDEX
Contents
When you come to the office;
01. Do you always wear your ID card?4
When you use information;
02. What classification should be applied to that information? 5
03. Isn't it personal information? 7
04. Do you pay attention when you open received mail message? 8
05. Do you always check the address to which you send a mail message? 9
06. Who is at the other end of the line? 10
07. Who is going to receive your FAX message? 11
08. Don't you leave printed sheets lying around? 12
When you use your PC;
09. Do you always deal your password confidential? 13
10. Is the website you are browsing really necessary for your work? 14
11. Don't you have a non-standard software program installed on your PC? 15
12. Are you using the latest version of anti-virus software? 16
13. Haven't you changed the standard settings? 17
14. Haven't you created shared folders on a PC? 18
15. Have you stored important information in the server? 19
16. Aren't you disposing of disused storage media as they are? 20
17. Haven't you stored any business data in personally owned PC or USB memory? 21
When you leave your desk;
18. Do you lock your PC screen when you leave your desk? 22
19. Don't you leave important documents on your desk? 23
When you are out of the office;
20. Don't you take your PC or USB memory etc. out of the office without permission? 24
21. Do you always pay attention to your surroundings when you go out? 25
When you leave the office;
22. Do you always look around your desk before you go home? 26
In case anything should happen,
23. When you feel something is wrong 27
Contact Information 28
List of Related documents 29
Information Security Handbook
INDEX
Do you always
W
h
y
If you do not use ID card properly, the system will not work and the
whole physical security system will be wasted.
04
?
Report
Appropriate
Information Classification
Nissan Secret A
?
or
Nissan Restricted B
or
Nissan Confidential C
or
Nissan Internal
or
Nissan General
W
h
y
05
Classification List
This is the list of confidential classification terminology that everyone must know.
Name
Ty p e
Example
Nissan Restricted B
Nissan Confidential C
Nissan Internal
Nissan General
Nissan Secret A
06
Isn't it
03 personal information?
When any information created and/or being handled contains personal
information, follow the regulations related to 'Act on the Protection of
Personal Information'.
Customer
Name
Address
Date
of
Birth
Phone
number
etc.
W
h
y
07
Attached files may contain computer virus. In some cases, you can
be infected by merely opening a message.
W
h
y
08
You should only include people who are allowed to know the contents
to the main message. The original message may be cited in forwarded
message or sometimes in reply. Check if there is any sensitive information.
W
h
y
09
Who is
1
2
W
h
y
10
07 FAX message?
?? ?
00-1234- 4678
NISSAN
** ** **
FAX Messag
00-1234-5678
NISSAN
W
h
y
11
Nis
san
Sec
ret
W
h
y
12
09 password confidential?
Select a password that cannot be easily guessed, and keep them strictly
confidential.
For password, use eight or more alphanumeric and special characters .
Avoid using words that are directly related to your personal life, such as
date of birth or name of your family members, simple words that can be
easily guessed, or words that can be found in a dictionary. Also, change
your PIN code and password at least every 60 days.
Never write down your password on a paper and stick it on your desk or
around your PC.
wor d
Pass ** ** *
**
ord
sw
Pas
OK
A01A
****
****
wor d
Pas s A1234
EL
NC
CA
W
h
y
13
USHI"
No.1
I"
"SUSH
ion for
N
te
Best Competito.1
Vo
1
No.
Vote
. 1
No
W
h
y
14
DOWNLOAD
W
h
y
15
When a new pattern file of anti-virus software you are using is released,
or a new security patch file containing fixing information is released,
install it promptly, following the instructions from the IS Division.
rn File
Virus Patte
mpleted
Update Co
OK
W
h
y
16
13 standard settings?
W
h
y
17
14 folders on a PC?
Do not create shared folders on any PC.
If you want to share folders via network, use shared folders in the
integrated file server.
If you create a shared folder, you need to set access right to the
folder by your own. If you fail to do setting properly, an unexpected
person may access to your PC.
W
h
y
There are viruses, such as Nimda, that can spread via shared
folders.
If there are too many PCs having shared folders, division servers
or domains you are searching may not appear in "My Network
Place," thereby causing inconvenience to many users.
Information Security Handbook
18
When you store a file related to copyright or software license in the integrated server,
make sure you comply with the copyright law or the license agreement.
W
h
y
19
Do not reuse storage media that contain sensitive data. Paper sheets on
which such data is printed must be shredded, and the reverse side of
such sheets must not be reused.
When you scrap disused floppy disks, magneto-optical disks, or DAT/DLTs, follow the
prescribed procedure. Refer to Japanese members near your desk for more details.
You can throw away other storage media such as CD-R by yourself, after you break them
and make them unusable.
W
h
y
20
W
h
y
21
When you leave your desk, please lock your PC screen, in order to avoid
your screen seen by others or used by others.
PC screen lock can be clone by [ctrl]+[alt]+[del] and select ' computer
lock '.
coffee
Or Alternatively,
PC cover closed for note/mobile PC.
Monitor SW off for desktop PC.
W
h
y
xxxx
1 2
3
xx
4
8 9
10 11 5 6 7
15 16
12 13
17 18
14
22 23
19 20
24 25
21
29 30
26 27
31
28
If you leave your desk with your PC logged on, you cannot prevent
somebody masquerading and operating your PC as you by using
your identification. You may be accused of wrongdoing that you
did not commit.
22
10: 0
0
Meet i ng
Leader
23
Due Date
xxxx
1 2
3 4
xx
8 9
10 11 5 6 7
15 16
12 13
17 18
14
22 23
19 20
24 25
21
29 30
26 27
31
28
FAX
Nissan Secret A
W
h
y
Cont ent
W
h
y
24
When you use your PC or open files outside of the office, be careful not
to let anybody peeking at your display.
Pay attention to your topics of conversation when you are in public
places such as when on a train, or at restaurants, etc.
W
h
y
25
You never know who is next to you. The person may be someone
with bad-intention, competitor or one of our customers.
A notebook PC with Mobile Setting (allowing access to the LAN from a remote
access area).
What is a mobile PC:
A notebook PC which is not a mobile PC.
W
h
y
26
When you
W
h
y
27
Contact Information
Fill in the following fields with contact information related information
security, your department and your name.
ISO
(Information Security Operator)
Name
Labeling Manual
PC Related GuidelinesApplications
IS Rules/Manuals
Revision History
Date
Context
reviser
March, 2006
First edition
Global IS Division
Security Office
August, 2007
Second edition
Revision of content structure
Addition of chapters 23
Revision of chapters 161117
2023 and a list of contacts.
Addition of a List of Related
Documents
ISecMC Administration
August, 2010
Third edition
Remove ' ID card compulsory usage
for PC '
Password 8 digits
October, 2015
forth edition
Update of the classification of
information and the labeling
Office