Checklist for computer and device use

Introductory note:
This checklist provides guidance for an organisation to create and maintain a Computer and Device Use Policy. It addresses key requirements to maintain sound risk management practices for all employees.
The guideline is a living document and will continue to be updated as new technologies, threats, risks, and solutions arise.

How to use this checklist:
This document is not a one-size-fits-all approach. Different organisations will have unique risks, threats and vulnerabilities, and will implement their computer and device use strategy with differing priorities.

Other notes:
The guideline is a living document and will continue to be updated as new technologies, threats, risks, and solutions arise.

Links to related content:
See our Data security obligations and date security breaches topic for detailed guidance on data security obligations and data security breaches.