search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Cyber Security We safeguard our systems, networks and devices from theft, loss or unauthorized access.


THE GE WAY POLICY SPOTLIGHT


Only install trusted applications on GE Information Resources. Applications that are not provided or approved by GE should not be used with GE Confidential or GE Highly Confidential Information.


• We seek to protect our networks, systems, devices, products, processes, services, and technology (GE Information Resources), and the extensive GE Proprietary Information they contain.


• We design GE Information Resources and products with security in mind and apply multiple layers of security controls.


• We monitor GE Information Resources in accordance with applicable law to protect the security of GE and GE Proprietary Information, to maintain GE operations, and to comply with applicable law and business obligations.


• We require third parties who process GE Proprietary Information on our behalf to implement information security controls that meet GE standards, and we assess those controls.


TIPS FOR KEEPING RESOURCES SECURE


• Secure physical copies of GE Proprietary Information and GE devices when not in use • Use strong passwords; don’t share your password with anyone • Avoid connecting to public or unsecure WiFi networks


• Avoid clicking on email links or opening attachments from unknown senders


HELP CORNER S&L Cyber Security Policy Security Portal


20 |


• When posting information online, do not disclose GE trade secrets, proprietary or other commercially sensitive information


YOUR ROLE


• Use only the GE Information Resources for which you have authorization.


• Do not use personal email, unapproved devices or unapproved software to conduct GE business.


• Understand the terms of use for GE’s collaboration applications, including how the applications should be used and the data types that are allowed in each application.


• Ensure GE Proprietary Information shared with a third party is transmitted using an approved, secure method and appropriately protected by the third party.


PROTECT COMPANY DATA / Cyber Security


THE SPIRIT & THE LETTER


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29