Understanding the risk that flexible-hybrid working introduces to Redgate can improve the security of working practice. This policy outlines the expectations for flexible-hybrid working with respect to the security of both personal and Redgate owned mobile devices (e.g. mobile phones, laptops, etc) and, more importantly, the information that those devices contain.
This policy applies to Redgaters, contractors and agents (collectively referred to as “Team” in the rest of this policy).
Working on Redgate services is only allowed from Redgate devices, or devices that comply with Redgate’s Bring Your Own Device (internal document - link removed) (BYOD) Policy.
Personal devices include (but not limited to):
Please refer to Redgate’s Flexible-hybrid Working Policy (internal document - link removed)
Please refer to Redgate’s Flexible-hybrid Working Policy (internal document - link removed).
Please refer to Redgate’s Flexible-hybrid Working Policy (internal document - link removed).
Please refer to the Health & Safety Policy (internal document - link removed) for how Redgate supports flexible-hybrid working.
Redgate expects our Team to maintain the same high levels of confidentiality and integrity when working remotely or at home as they would when working in the office. As such, good practice such as screen locking, making sure your screen isn’t overlooked, clearing your desk and locking away sensitive data should all be practiced remotely or at home as you would in the office.
There are potential risks when working remotely. This section aims to address the most significant risks but will not be exhaustive. At a high level, we would ask that you apply common sense to your working conditions and environment.
We would consider your home to be a safe environment, unless you house-share with individuals you don’t know well.
If sharing your home with others, or you have small children, you must:
When working in a public place, you must take special care to:
In any remote setting, always keep paperwork with you, or otherwise secured.
You must always be aware of the requirement to adequately protect the information you work with. This means that:
All information in Redgate’s Information Security Policies and IT Guidelines that apply in the office also remain applicable when working from outside of the Redgate office or when working from home, specifically:
Use of Redgate owned technology and systems must be in keeping with our Information Security-related Policies. Failure to do so may result in disciplinary action.