by clicking the arrows at the side of the page, or by using the toolbar.
by clicking anywhere on the page.
by dragging the page around when zoomed in.
by clicking anywhere on the page when zoomed in.
web sites or send emails by clicking on hyperlinks.
Email this page to a friend
Search this issue
Index - jump to page or section
Archive - view past issues
Project Manager : Project Manager June July 2012
to and that confidential information is stored in a secure environment; • Persons with access to confidential information should only provide or discuss confidential information with persons that have signed a confidentiality deed; • Each member of the project team should sign a confidentiality deed as well as others who have access to confidential information. The project manager is to maintain a register of who has signed the document. • The project team is to secure all hard-copy confidential information. Keys to the secure cabinets are to be held by the project manager. • Confidential documents must not be left unattended within the office area . • Project advisers are required to establish security arrangements within their premises in order to ensure that the confidentiality of information is protected. This includes security over access to IT systems and hard-copy documents. • Confidential information may be removed from the secure premises where it is required to progress the project. Confidential information must, at all times, be in the personal possession of the individual or locked in a secure environment. Written approval to remove confidential information from the premises may be provided by the project manager if security can be guaranteed. • No project-related information is to be posted on any social media site without the approval of the project manager. • Access to the web collaboration system used will only be available to persons that have signed a confidentiality deed. • Confidential documents must be immediately removed from printers where persons that have not signed the confidentiality deed may access the printer. • Where practical, and for particularly sensitive information, hand deliver y, registered post or couriers must be utilised. Documents are to be securely packaged and marked ‘confidential’. ••• there is no Point having Protocols if you don’t bother to enforce them www.aipm.com.au Project Manager 31
Project Manager April May 2012
Project Manager Aug Sept 2012