{"id":92035,"date":"2021-02-08T07:46:01","date_gmt":"2021-02-08T00:46:01","guid":{"rendered":"https:\/\/it.telkomuniversity.ac.id\/kebijakan-keamanan-informasi\/"},"modified":"2025-03-13T15:18:29","modified_gmt":"2025-03-13T08:18:29","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/it.telkomuniversity.ac.id\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Telkom University Information Security Policy<\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"1024\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-724x1024.png\" alt=\"Kebijakan Keamanan Informasi Telkom University\" class=\"wp-image-169860\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-724x1024.png 724w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-212x300.png 212w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-768x1086.png 768w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-1086x1536.png 1086w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University-1448x2048.png 1448w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Keamanan-Informasi-Telkom-University.png 1587w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><figcaption class=\"wp-element-caption\">Information Security Policy Telkom University<br><\/figcaption><\/figure>\n\n\n\n<p>In an effort to maintain information security, Telkom University implements&nbsp;<strong>Clear Desk, Clear Screen, and Access Control<\/strong>&nbsp;policies . These policies aim to protect important institutional data and ensure a safe work environment.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Clear Screen<\/strong>\n<ul class=\"wp-block-list\">\n<li>Make sure work devices are locked when not in use.<\/li>\n\n\n\n<li>Use a strong password.<\/li>\n\n\n\n<li>Store passwords using a password manager, not in a browser.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Clear Desk<\/strong>\n<ul class=\"wp-block-list\">\n<li>Avoid storing institutional documents openly.<\/li>\n\n\n\n<li>Do not leave food and drinks around the work area.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Device Security<\/strong>\n<ul class=\"wp-block-list\">\n<li>Use antivirus software and keep your system updated.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Guest Recording (Log Book)<\/strong>\n<ul class=\"wp-block-list\">\n<li>All guests must be registered before entering the campus area, especially in the directorates and faculties.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Incident Handling<\/strong>\n<ul class=\"wp-block-list\">\n<li>Immediately report any loss of device or institutional data to the appropriate authorities.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Tips to Protect Your Personal Data<\/strong><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"723\" height=\"1024\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-723x1024.png\" alt=\"Kebijakan Perlindungan Data Pribadi Telkom University\" class=\"wp-image-169863\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-723x1024.png 723w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-212x300.png 212w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-768x1087.png 768w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-1085x1536.png 1085w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/03\/Kebijakan-Perlindungan-Data-Pribadi-Telkom-University-1446x2048.png 1446w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><figcaption class=\"wp-element-caption\">Telkom University Personal Data Protection Policy<\/figcaption><\/figure>\n\n\n\n<p>In today&#8217;s digital era, maintaining the security of personal data is very important. Telkom University provides guidance for all academics to protect their personal information from cyber threats. Here are some steps that can be taken:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable Dual Authentication<\/strong>\u00a0(2FA\/MFA) to increase account protection.<\/li>\n\n\n\n<li><strong>Change your password regularly<\/strong>\u00a0, at least every 6 months, to avoid the risk of data leaks.<\/li>\n\n\n\n<li><strong>Keep account information confidential<\/strong>\u00a0by not sharing credentials with anyone.<\/li>\n\n\n\n<li><strong>Use official software and always update it<\/strong>\u00a0to keep your system safe from security holes.<\/li>\n\n\n\n<li><strong>Beware of spam emails and suspicious messages<\/strong>\u00a0that could potentially be phishing attempts.<\/li>\n\n\n\n<li><strong>Avoid sharing other people&#8217;s personal information or data<\/strong>\u00a0without permission to maintain privacy and security.<\/li>\n<\/ul>\n\n\n\n<p>By implementing this policy, Telkom University is committed to maintaining data security and creating a safer working environment for all academicians.<\/p>\n\n\n\n<p>Information Security Policy (Revision 02)<\/p>\n\n\n\n<p>Effective January 29, 2021<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2021\/02\/Kebijakan-Keamanan-Informasi-Rev-02.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Information Security Policy Rev 02.\"><\/object><a id=\"wp-block-file--media-e9234c60-1355-408e-b469-f15832c38349\" href=\"https:\/\/it.telkomuniversity.ac.id\/en\/?attachment_id=91964\" target=\"_blank\" rel=\"noreferrer noopener\">Information Security Policy Rev 02<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Telkom University Information Security Policy In an effort to maintain information security, Telkom University implements&nbsp;Clear Desk, Clear Screen, and Access Control&nbsp;policies . These policies aim to protect important institutional data and ensure a safe work environment. Tips to Protect Your Personal Data In today&#8217;s digital era, maintaining the security of personal data is very important. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":91984,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-92035","page","type-page","status-publish","has-post-thumbnail","hentry"],"blocksy_meta":{"page_structure_type":"type-4","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/92035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=92035"}],"version-history":[{"count":0,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/92035\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media\/91984"}],"wp:attachment":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=92035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}